Skip to main content

Securing the residential asynchronous transfer mode networks

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1189))

Included in the following conference series:

  • 289 Accesses

Abstract

In this paper, we consider the security management of a residential ATM network, the ATM Warren. Threats within the ATM Warren are presented and counter-measures to some of these threats are suggested. Security issues in the ATM Warren such as protection domain, naming, firewalling and delegation are also discussed. We also propose user authentication mechanism based on infra-red remote control. Finally, we demonstrate an efficient data path protection mechanism that is able to handle dumb ATM end devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheswick W. and Bellovin S.: Firewall and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, Mass. 1994

    Google Scholar 

  2. Hayter M. D. and McAuley D. R.: The Desk Area Network. ACM Operating Systems Review, v.25, n.4, pp.14–21, October 1991

    Article  Google Scholar 

  3. Chuang S. C.: Securing ATM Networks. University of Cambridge Computer Laboratory, Technical Report 384. July 1995

    Google Scholar 

  4. Chuang S. C.: Securing ATM Networks. Proceedings of the 3nd ACM Conference on Computer and Communications Security. March 1996. 19–30

    Google Scholar 

  5. Greaves D. J.: Residential ATM Common Aspects. ATM Forum Contribution 95-0214, HREF='http://www.cl.cam.ac.uk/users/djg/residential-baseline.txt. 1995

    Google Scholar 

  6. Haller N.: The S/KEY One-Time Password System. RFC1760. February 1995

    Google Scholar 

  7. Lomas T.M.A.: Collision-Freedom, Considered Harmful, or How to Boot a Computer. Proceeding 1995 Japan-Korea Joint Workshop on Information Security and Cryptology. January 1995

    Google Scholar 

  8. Tennenhouse D.: Layered Multiplexing Considered Harmful. IFIP WG6.1/6.4 Workshop: Protocols for High Speed Networks, IBM Zurich Research Lab. Ed. Harry Rubin and Robin Williamson. May 1989

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Mark Lomas

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chuang, SC., Greaves, D. (1997). Securing the residential asynchronous transfer mode networks. In: Lomas, M. (eds) Security Protocols. Security Protocols 1996. Lecture Notes in Computer Science, vol 1189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62494-5_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-62494-5_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62494-3

  • Online ISBN: 978-3-540-68047-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics