By Topic

Secure network design: A layered approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
D. N. Serpanos ; Dept. of Electr. & Comput. Eng., Patras Univ., Greece ; A. G. Voyiatzis

Security solutions for networks typically appear as single protocols, or protocols that correspond to a single layer of the OSI network reference model (protocol stack). The result is a wide variety of protocols which provide solutions to very specific problems and environments. In this paper, we introduce an architecture for secure networks, which is based on layers, in analogy to the OSI protocol stack Adoption of a layered approach leads to many advantages in secure network design: modularity, flexibility, ease of standardization, etc. We introduce a reference model with 4 layers and argue that it is suitable for conventional network architectures. We present how layers of the secure network reference model correspond to layers of the OSI protocol stack, and we demonstrate that use of the layers leads to security solutions that resolve several problems of existing security protocols.

Published in:

Autonomous Decentralized System, 2002. The 2nd International Workshop on

Date of Conference:

6-7 Nov. 2002