원문정보
초록
영어
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addresses various infrastructure requirements for transmitting data in high speed networks. However, this development creates new vulnerabilities when these protocols are designed to solely rely on existing security solutions of existing protocols such as TCP and UDP. It is clear that not all security protocols (such as TLS) can be used to protect UDT, just as security solutions devised for wired networks cannot be used to protect the unwired ones. The development of UDT, similarly in the development of TCP/UDP many years ago, lacked a well-thought security architecture to address the problems that networks are presently experiencing. This paper proposes and analyses practical security mechanisms for UDT.
목차
1. Introduction
2. Overview
3. Related Works
4. Motivations
4.1 UDT Security Limitations
5. Securing UDT
5.1 Host Identity Protocol (HIP)
5.2 Cryptographically Generated Addresses (CGA)
5.3 Generic Security Service- Application Program Interface (GSS-API)
5.4 Data Transport Layer Security (DTLS)
5.5. Internet Protocol Security (IPsec)
5.6. UDT-Authentication Option
6. Simulation and Implementation Schemes
7. Results
8. Conclusion and Future Work
9. References
