Title
Data protection based on physical separation: concepts and application scenarios
Abstract
Data protection is an increasingly important issue in today's communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a threat model is presented. The main target is delay-sensitive applications such as telephony signaling, live TV, and radio broadcasts that require only lightweight security. The threat considered is malicious interception of network transfers through so-called eavesdropping attacks. Application scenarios and techniques to provide physically separate paths are discussed.
Year
DOI
Venue
2005
10.1007/11424925_138
ICCSA (4)
Keywords
Field
DocType
general concept,important issue,separate path,network transfer,delay-sensitive application,threat model,communication network,data stream,physical separation,application scenario,data protection,telecommunications,computer science
Data stream mining,Telecommunications network,Eavesdropping,Cryptography,Threat model,Computer security,Computer science,Computer network,Data Protection Act 1998,Telephony,Overlay network
Conference
Volume
ISSN
ISBN
3483
0302-9743
3-540-25863-9
Citations 
PageRank 
References 
0
0.34
15
Authors
3
Name
Order
Citations
PageRank
Stefan Lindskog115321.77
Karl-Johan Grinnemo214321.42
Anna Brunstrom3445125.16