Description
If you have the responsibility to enforce security policies for your ATM networks, implementing ATM security devices (both hardware and software), or simply need to better understand the mechanisms defined in the ATM Forum Security Specification 1.1, Implementing Security for ATM Networks is must reading. Specifically targeted at ATM network security, including cryptographic and architectural techniques, it provides you with a solid understanding of the current and future state of ATM security. From an introduction to network security and fundamentals, to implementing and using ATM security, security association establishment protocols, initial authentication, data origin authentication/integrity, encryption, access control, and PNNI routing, this first-of-its-kind book provides practical need-to-know information for network architects, ATM security implementers and researchers who wish to gain a thorough understanding of the current and future state of ATM security standards and mechanisms.
Table Of Contents
Preface.; Section I: Fundamentals.; Introduction to Network Security - Up-front Security Analysis. Authentication. Authorization. Access Control. Auditing. Encryption.; ATM Networking Fundamentals - ATM Reference Model. Cell Switching. ILMI. ATM Virtual Circuit Signaling. Routing ATM Connections. Multipoint Connections. Operations and Management. ATM Traffic Management. ATM Services.; Section II: Using ATM Security.; Implementing ATM Security Using Traditional ATM Features - Implementing ATM Connection Policies. Access Control for Signaled ATM Circuits. Network Configuration Security.; Implementing ATM Security Using the ATM Forum 's Security Version 1.1 Functions - Security 1.1 Model. Security 1.1 Services. User Plane Security Services. Control Plane Security Services. ; Section III: Implementing ATM Security.; Security Message Exchange Protocol - SME Fundamentals. Protocol Message Transport. Security Agent Addressing. Security Association Negotiation. ; Initial Authentication - Authentication Protocols. Using Secret-Key Message Authentication Codes. Using Public-Key Signature Algorithms.; Data Origin Authentication/Integrity - Implementation Overview. Keyed Message Authentication Codes.; Encryption - Encryptor Architecture. Public Key vs. Secret Key Algorithms. Block Algorithms. Modes of Operation. Key Agility. Performance Considerations.; Access Control.; PNNI Routing Security.; Section IV: Additional Topics in ATM Security.; Standards Development Topics - Security-Based Routing and Discovery, Renegotiation of Security Services, Wireless ATM Security. ; Research Topics - Algorithm- and Robustness-Agile Encryption. Control Plane Confidentiality. Control Plane Authentication. ATM Network Intrusion Detection.;
Author
-
Thomas D. Tarman
Thomas D. Tarman is a member of the technical staff at Sandia National Laboratories, a research and development facility for the United States Department of Energy, in Albuquerque, New Mexico. Mr. Tarman holds a BS. in computer and electrical engineering, and an M.S. in electrical engineering, both from Purdue University.
-
Edward L. Witzke
Edward L. Witzke is a member of the technical staff at Sandia National Laboratories, a research and development facility for the United States Department of Energy, in Albuquerque, New Mexico. Mr. Witzke holds a Bachelor of University Studies with a concentration in computer science from the University of New Mexico.