{"title":"Security Mechanisms in Network Protocols","authors":"M. Kolodziejczyk, M. Ogiela","doi":"10.1109/ISMS.2010.83","DOIUrl":null,"url":null,"abstract":"This paper describes few, popular security mechanisms used by network protocols. Many of protocols were designed with assumption that there are no intruders, that every device in the network should trust to other devices and users. Such assumption was true many years ago. The network situation has been changed for last ten years and we should realize that some properties of existing protocols may be abused. Basic level of trust is necessary, but if this level is too high, standard protocols may be abused. This paper is also an attempt to create some basic rules and requirements which should be met by secure network protocols.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Intelligent Systems, Modelling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMS.2010.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper describes few, popular security mechanisms used by network protocols. Many of protocols were designed with assumption that there are no intruders, that every device in the network should trust to other devices and users. Such assumption was true many years ago. The network situation has been changed for last ten years and we should realize that some properties of existing protocols may be abused. Basic level of trust is necessary, but if this level is too high, standard protocols may be abused. This paper is also an attempt to create some basic rules and requirements which should be met by secure network protocols.