[go: up one dir, main page]

Ciravegna et al., 2024 - Google Patents

IKE-less IPsec for Centralized Management of Network Security

Ciravegna et al., 2024

View PDF
Document ID
3143734997259838517
Author
Ciravegna F
Bruno G
Lioy A
et al.
Publication year
Publication venue
CEUR WORKSHOP PROCEEDINGS

External Links

Snippet

In the realm of network security, the implementation of robust security measures is crucial to safeguard sensitive data and ensure the integrity of communication channels. To this end, the IPsec protocol enables the secure communication at network level. Initially reliant on …
Continue reading at ceur-ws.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Similar Documents

Publication Publication Date Title
US10778659B2 (en) System and method for protecting communications
US9461975B2 (en) Method and system for traffic engineering in secured networks
US8959334B2 (en) Secure network architecture
US20200389437A1 (en) Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter
US11799844B2 (en) Secure communication network
Abdalla et al. End-to-end O-RAN security architecture, threat surface, coverage, and the case of the open fronthaul
WO2015116768A2 (en) Systems and methods for protecting communications
Aziz et al. Software defined networking (SDN) and its security issues
Samociuk Secure communication between openflow switches and controllers
EP4323898B1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
CN116915486B (en) Cloud service communication system
Kim et al. OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing.
Kwon et al. Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
EP2028822B1 (en) Method and system for securing a commercial grid network over non-trusted routes
Ciravegna et al. IKE-less IPsec for Centralized Management of Network Security
Miguel-Alonso Securing IoT networks through SDN technologies
Tian et al. Network security and privacy architecture
EP2090073B1 (en) Secure network architecture
Oberle et al. Integrity based relationships and trustworthy communication between network participants
Zou Network performance and key management of VPN tunnels between autonomous vehicles
Rajendran Security analysis of a software defined wide area network solution
Coscia Evaluation of Network-Layer Security Technologies for Cloud
Wiebelitz et al. Transparent identity-based firewall transition for eScience
Lee et al. Platform Based on Network Overlay and MAC Security
Turcotte et al. Inspection-Friendly TLS/HTTPS