Preview

Hybrid Network Security

Powerful Essays
Open Document
Open Document
10587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hybrid Network Security
ACCEPTED FROM OPEN CALL

SECURITY ISSUES IN HYBRID NETWORKS WITH A SATELLITE COMPONENT
AYAN ROY-CHOWDHURY, JOHN S. BARAS, MICHAEL HADJITHEODOSIOU, AND SPYRO PAPADEMETRIOU, UNIVERSITY OF MARYLAND AT COLLEGE PARK

ABSTRACT

Satellites are expected to play an increasingly important role in providing broadband Internet services over long distances in an efficient manner. Most future networks will be hybrid in nature — having terrestrial nodes interconnected by satellite links. Security is an imporSSSL tant concern in such networks, since the session 2 Proxy satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption. In this article we address the issue of securing communication in satellite networks. We discuss various security attacks that are possible in hybrid SSSL session 1 SSSL handshaking and satellite translation at client proxy (RPA) networks, and survey the different solutions proposed to secure data communications in these networks. We look at the perforMost future networks mance problems arising in hybrid networks due to security additions like Internet Security Prowill be hybrid in tocol (IPSec) or Secure Socket Layer (SSL), and suggest solutions to performance-related nature — having problems. We also point out important drawbacks in the proposed solutions, and suggest a terrestrial nodes hierarchical key-management approach for interconnected by adding data security to group communication in hybrid networks.

satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption.

INTRODUCTION
With the rapid growth of the Internet, satellite networks are increasingly being used to deliver Internet services to large numbers of geographically dispersed users. The primary advantage of satellite networks is their wide broadcast reach — a satellite can reach users in

You May Also Find These Documents Helpful

  • Powerful Essays

    It 242 Final Project

    • 1213 Words
    • 5 Pages

    Now with Satellite communications it will let the company have long distance network communication and connectivity. There will be LAN’s at each location which will best benefit with a Cat-5 which will support 100BaseTx which will allow for a fast Ethernet network able to get speeds of up to 100Mbps. This allows for packet switching, latency, and there channel capacity will be more proficient. The packet switching will allow for optimized use of the channel capacity available in digital telecommunication networks. With packet…

    • 1213 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    At Aircraft Solutions, there are several samples of concerns that could lead to a breach of information or compromised branch of their system. Due to the design of their geographical layout, secure connections that encrypt the transferred data must be implemented. The internal IT team should consider installing IPSec tunnels, which enable a connection between two hosts or end points to be secured by IP payload and encapsulated encryption. Enabling these protocols provides a secure connection, essentially limiting the potential hijack of service or confidential data. Hackers often place themselves in between the two servers or a VPN to intercept the data and in turn use that data, which could have user information, to crack in to the internal network without any retort.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unsecured Networks – Risk from using unsecured networks can be mitigated but not eliminated. Us encryption technologies to protect the confidentiality and integrity of communications, as well as using mutual authentication mechanisms to verify the identities of both endpoints…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CS 8 Midterm 3 Study Guide

    • 2206 Words
    • 7 Pages

    Satellite Internet Access: more global and more expensive. Speed compatible to DSL. Weather conditions are a problem and positioned…

    • 2206 Words
    • 7 Pages
    Good Essays
  • Good Essays

    It 242 Week 8 Assignment

    • 686 Words
    • 3 Pages

    Satellite signals are similar to microwave which require a direct line of sight to ensure proper transmission. Satellites require that a satellite is in geosynchronous orbit of the earth and receiver must be locked on satellites orbit at all times to maintain connection. Satellites can cover large areas since they are in high orbit they can relay signals through other…

    • 686 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Publix

    • 6258 Words
    • 26 Pages

    Bahaudin G. Mujtaba, (E-mail: Mujtaba@nova.edu), Nova Southeastern University Erica Franklin, (E-mail: efrankl@nova.edu), Nova Southeastern University…

    • 6258 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    ET2530 Research Paper

    • 1184 Words
    • 4 Pages

    The role of satellite networks in global communications is growing at an unprecedented pace. From direct broadcast satellite (DBS) television, to satellite phones, to credit card transactions, to the Internet, corporations and consumers are embracing these new services and placing demands on bandwidth. With this demand have come expectations in terms of basic service costs, hardware costs, and ease-of-use. These expectations have forced the industry to examine its traditional ways of operating in order to make satellite services as accessible and convenient as its terrestrial competitors.…

    • 1184 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    GEOSYNCHRONOUS orbiting satellites are the type used by the most popular satellite Internet access service providers.…

    • 925 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Space Race Research Paper

    • 1983 Words
    • 8 Pages

    Satellites have benefited our everyday lives. "Communication satellites are responsible for instantaneous television coverage of events all over the globe, for the speed of international banking and finance, for the almost-immediate delivery of vast amounts of information, and for international e-mail and telephone service to all parts of the Earth." ("Neal 186") When a person watches television, the television is sent from the station to a satellite and to a local provider. Without satellites, a person would be able to only watch local stations, but with satellites a person can watch a television program from anywhere in the world, talk to anyone, or even send e-mail.…

    • 1983 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * In this paper, i will introduce a overview about this security protocol: what is it? What are its core components? And how this protocol was implemented in the practical?…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Satellite multicast applications now plays a significant role in our daily life. Satellite systems can reach any location on the earth and provide broadcasting services from one transmitter to many receivers. Since born in 1965, satellite communications have developed promising tele-communication and digital video broadcasting via satellite services all over the world. Up to now, especially with the advent of Fourth Generation (4G) of wireless communications…

    • 7131 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    [3] 3GPP. Security aspects of early IP multimedia subsystem (IMS) (release 7). Technical Report TS 33.978 V7.0.0, June 2007.…

    • 3020 Words
    • 13 Pages
    Powerful Essays