Ciravegna et al., 2024 - Google Patents
IKE-less IPsec for Centralized Management of Network SecurityCiravegna et al., 2024
View PDF- Document ID
- 3143734997259838517
- Author
- Ciravegna F
- Bruno G
- Lioy A
- et al.
- Publication year
- Publication venue
- CEUR WORKSHOP PROCEEDINGS
External Links
Snippet
In the realm of network security, the implementation of robust security measures is crucial to safeguard sensitive data and ensure the integrity of communication channels. To this end, the IPsec protocol enables the secure communication at network level. Initially reliant on …
- 238000004458 analytical method 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10778659B2 (en) | System and method for protecting communications | |
| US9461975B2 (en) | Method and system for traffic engineering in secured networks | |
| US8959334B2 (en) | Secure network architecture | |
| US20200389437A1 (en) | Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter | |
| US11799844B2 (en) | Secure communication network | |
| Abdalla et al. | End-to-end O-RAN security architecture, threat surface, coverage, and the case of the open fronthaul | |
| WO2015116768A2 (en) | Systems and methods for protecting communications | |
| Aziz et al. | Software defined networking (SDN) and its security issues | |
| Samociuk | Secure communication between openflow switches and controllers | |
| EP4323898B1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
| CN116915486B (en) | Cloud service communication system | |
| Kim et al. | OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing. | |
| Kwon et al. | Mondrian: Comprehensive Inter-domain Network Zoning Architecture. | |
| EP2028822B1 (en) | Method and system for securing a commercial grid network over non-trusted routes | |
| Ciravegna et al. | IKE-less IPsec for Centralized Management of Network Security | |
| Miguel-Alonso | Securing IoT networks through SDN technologies | |
| Tian et al. | Network security and privacy architecture | |
| EP2090073B1 (en) | Secure network architecture | |
| Oberle et al. | Integrity based relationships and trustworthy communication between network participants | |
| Zou | Network performance and key management of VPN tunnels between autonomous vehicles | |
| Rajendran | Security analysis of a software defined wide area network solution | |
| Coscia | Evaluation of Network-Layer Security Technologies for Cloud | |
| Wiebelitz et al. | Transparent identity-based firewall transition for eScience | |
| Lee et al. | Platform Based on Network Overlay and MAC Security | |
| Turcotte et al. | Inspection-Friendly TLS/HTTPS |