The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

ATM Security Scope and Requirements

Author

Mohammad Peyravian,Els Van Herreweghen

Entry type

techreport

Abstract

This contribution identifies security scope and requirements in ATM networks. It first discusses general network security services and identifies the security service required in ATM. It then considers three scenarios: the end-to-end case (securing ATM connections between the ATM endpoints), the edge-to-edge case (securing the part of a connection crossing a public network), and the endpoint-to-switch case (securing ATM connection between and ATM endpoint and a switch). It further elaborates on the issue of authenticated (and other security related) signalling treated in previous contributions and suggests a clear separation between the authentication needed at the ATM level on one side and the higher-level (end-user) authentication needed by network and service providers on the other side. Finally, it is suggested how to include different levels of authentication information in ATM signalling messages.

Date

1995 – June

Institution

IBM Corporation - Research Laboratory

Key alpha

Peyravian

Publication Date

0000-00-00

Location

A hard-copy of this is in the Papers Cabinet

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.