2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5199335
|View full text |Cite
|
Sign up to set email alerts
|

Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

Abstract: Abstract-In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid satellite networks. Satellite networks use TCP and HTTP performance-enhancing proxy servers to overcome the adverse effect of the large delay-bandwidth product of the satellite channel. However, the proxy servers cannot function when IPSEC and SSL are used for secure unicast communication in hybrid satellite networks. We therefore pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Our approach, called 2L‐IPsec (two‐layer IPsec), is partially based on the proposals ML‐IPsec , LES and performance‐aware security , because we also divide the packet in different parts that can be encrypted with different cryptographic keys and algorithms. The idea is to use layered encryption because it allows us to selectively disclose different parts of a packet to different users without compromising the security of the other parts.…”
Section: Deploying Internet Protocol Security In a Scenario With Perfmentioning
confidence: 99%
See 2 more Smart Citations
“…Our approach, called 2L‐IPsec (two‐layer IPsec), is partially based on the proposals ML‐IPsec , LES and performance‐aware security , because we also divide the packet in different parts that can be encrypted with different cryptographic keys and algorithms. The idea is to use layered encryption because it allows us to selectively disclose different parts of a packet to different users without compromising the security of the other parts.…”
Section: Deploying Internet Protocol Security In a Scenario With Perfmentioning
confidence: 99%
“…A critical analysis of ML‐IPsec can be found in . Likewise, and are two proposals that also divide packets into zones: one zone for the TCP/IP headers and another for the user data. In , the two zones are encrypted using two different keys, whereas in , different cryptographic algorithms are also used.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[4] Introduces a layered architecture extension in IPSec, called CL-IPSec, to provide authentication and integrity services. Based on the original IPSec-PEP, [5] proposes a certificate-based multiple key exchange protocol to avoid the key distribution problem. Insufficiently, the existing solutions cannot guarantee the transmission efficiency and security concurrently over the resource-limited satellite-ground link.…”
Section: Introductionmentioning
confidence: 99%
“…Our method for the selection of the optimal strategy is based on a model of the overall technological infrastructure, comprising hardware and network components [11], which is used to carry out an optimal design of infrastructures by minimizing costs required to satisfy given performance requirements of both computing and communication ( [10]─ [13]). …”
Section: Introductionmentioning
confidence: 99%