Abstract | ||
---|---|---|
Data protection is an increasingly important issue in today's communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a threat model is presented. The main target is delay-sensitive applications such as telephony signaling, live TV, and radio broadcasts that require only lightweight security. The threat considered is malicious interception of network transfers through so-called eavesdropping attacks. Application scenarios and techniques to provide physically separate paths are discussed. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11424925_138 | ICCSA (4) |
Keywords | Field | DocType |
general concept,important issue,separate path,network transfer,delay-sensitive application,threat model,communication network,data stream,physical separation,application scenario,data protection,telecommunications,computer science | Data stream mining,Telecommunications network,Eavesdropping,Cryptography,Threat model,Computer security,Computer science,Computer network,Data Protection Act 1998,Telephony,Overlay network | Conference |
Volume | ISSN | ISBN |
3483 | 0302-9743 | 3-540-25863-9 |
Citations | PageRank | References |
0 | 0.34 | 15 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Stefan Lindskog | 1 | 153 | 21.77 |
Karl-Johan Grinnemo | 2 | 143 | 21.42 |
Anna Brunstrom | 3 | 445 | 125.16 |