2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5199441
|View full text |Cite
|
Sign up to set email alerts
|

Secure Signaling in Next Generation Networks with NSIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…The rather delicate NATFW NSLP operation which consists in opening pinholes on firewall and performs NAT binding, undermines the main purpose of these devices and carries a risk from authentication point of view to prevent unauthorized access. In order to manage critical resources (such as the opening of pinholes on firewall), GIST protocol does not have appropriate mechanisms to verify the identity of a given host (authentication), if authorized to use a particular service (authorization), and finally starting its credit once it actually uses this service (Accounting) [8], [9]. Security within NSIS is therefore limited to already existing channel security mechanisms like TLS or IPsec as provided by the NTLP layer.…”
Section: Nsis Framework and Natfw Nslp Protocolmentioning
confidence: 99%
“…The rather delicate NATFW NSLP operation which consists in opening pinholes on firewall and performs NAT binding, undermines the main purpose of these devices and carries a risk from authentication point of view to prevent unauthorized access. In order to manage critical resources (such as the opening of pinholes on firewall), GIST protocol does not have appropriate mechanisms to verify the identity of a given host (authentication), if authorized to use a particular service (authorization), and finally starting its credit once it actually uses this service (Accounting) [8], [9]. Security within NSIS is therefore limited to already existing channel security mechanisms like TLS or IPsec as provided by the NTLP layer.…”
Section: Nsis Framework and Natfw Nslp Protocolmentioning
confidence: 99%
“…While a large number of works within the communication field focus on extensions to protocol mechanisms assuring authentication and authorization features [11,12,13], the most noteworthy research works are those investigating access control and trust management issues, as outlined in the following.…”
Section: Related Workmentioning
confidence: 99%
“…is used to denote a parameter whose value is not specified and in ProviderA access rules, the symbol '∩' denotes the conjunction (logical AND) of constraints, as explained in [13]. Table 1 Alice represents the Distinguished Name (DN) of the principal specified in the first three credentials for the roles issued by ProviderD, ProviderC and ProviderB.…”
Section: Rtml Credentials and Access Rulesmentioning
confidence: 99%
“…The latter is required if authorization decisions depend on a user identity rather than on a node identity. Therefore, the NSIS framework provides an optional so-called Session Authorization Object [13] that provides a means to authenticate NSIS signaling messages on a per user or per session basis [14] at NSLP level. The object may carry authentication tokens and can be used for integrity protection of NSLP messages, too.…”
Section: B Authenticated Setup Of Virtual Linksmentioning
confidence: 99%