Secure network design: A layered approach

D. N. Serpanos, A. G. Voyiatzis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Security solutions for networks typically appear as single protocols, or protocols that correspond to a single layer of the OSI network reference model (protocol stack). The result is a wide variety of protocols which provide solutions to very specific problems and environments. In this paper, we introduce an architecture for secure networks, which is based on layers, in analogy to the OSI protocol stack Adoption of a layered approach leads to many advantages in secure network design: modularity, flexibility, ease of standardization, etc. We introduce a reference model with 4 layers and argue that it is suitable for conventional network architectures. We present how layers of the secure network reference model correspond to layers of the OSI protocol stack, and we demonstrate that use of the layers leads to security solutions that resolve several problems of existing security protocols.

Original languageEnglish
Title of host publicationProceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages95-100
Number of pages6
ISBN (Print)0780376242, 9780780376243
DOIs
Publication statusPublished - 2002
Externally publishedYes
Event2nd International Workshop on Autonomous Decentralized System, IWADS 2002 - Beijing, China
Duration: 6 Nov 20027 Nov 2002

Other

Other2nd International Workshop on Autonomous Decentralized System, IWADS 2002
CountryChina
CityBeijing
Period6/11/027/11/02

Fingerprint

Network protocols
Network architecture
Standardization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Cite this

Serpanos, D. N., & Voyiatzis, A. G. (2002). Secure network design: A layered approach. In Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002 (pp. 95-100). [1194655] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IWADS.2002.1194655

Secure network design : A layered approach. / Serpanos, D. N.; Voyiatzis, A. G.

Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002. Institute of Electrical and Electronics Engineers Inc., 2002. p. 95-100 1194655.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Serpanos, DN & Voyiatzis, AG 2002, Secure network design: A layered approach. in Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002., 1194655, Institute of Electrical and Electronics Engineers Inc., pp. 95-100, 2nd International Workshop on Autonomous Decentralized System, IWADS 2002, Beijing, China, 6/11/02. https://doi.org/10.1109/IWADS.2002.1194655
Serpanos DN, Voyiatzis AG. Secure network design: A layered approach. In Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002. Institute of Electrical and Electronics Engineers Inc. 2002. p. 95-100. 1194655 https://doi.org/10.1109/IWADS.2002.1194655
Serpanos, D. N. ; Voyiatzis, A. G. / Secure network design : A layered approach. Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002. Institute of Electrical and Electronics Engineers Inc., 2002. pp. 95-100
@inproceedings{7fba48fd2d8f47e4bed2d72fccee9d04,
title = "Secure network design: A layered approach",
abstract = "Security solutions for networks typically appear as single protocols, or protocols that correspond to a single layer of the OSI network reference model (protocol stack). The result is a wide variety of protocols which provide solutions to very specific problems and environments. In this paper, we introduce an architecture for secure networks, which is based on layers, in analogy to the OSI protocol stack Adoption of a layered approach leads to many advantages in secure network design: modularity, flexibility, ease of standardization, etc. We introduce a reference model with 4 layers and argue that it is suitable for conventional network architectures. We present how layers of the secure network reference model correspond to layers of the OSI protocol stack, and we demonstrate that use of the layers leads to security solutions that resolve several problems of existing security protocols.",
author = "Serpanos, {D. N.} and Voyiatzis, {A. G.}",
year = "2002",
doi = "10.1109/IWADS.2002.1194655",
language = "English",
isbn = "0780376242",
pages = "95--100",
booktitle = "Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Secure network design

T2 - A layered approach

AU - Serpanos, D. N.

AU - Voyiatzis, A. G.

PY - 2002

Y1 - 2002

N2 - Security solutions for networks typically appear as single protocols, or protocols that correspond to a single layer of the OSI network reference model (protocol stack). The result is a wide variety of protocols which provide solutions to very specific problems and environments. In this paper, we introduce an architecture for secure networks, which is based on layers, in analogy to the OSI protocol stack Adoption of a layered approach leads to many advantages in secure network design: modularity, flexibility, ease of standardization, etc. We introduce a reference model with 4 layers and argue that it is suitable for conventional network architectures. We present how layers of the secure network reference model correspond to layers of the OSI protocol stack, and we demonstrate that use of the layers leads to security solutions that resolve several problems of existing security protocols.

AB - Security solutions for networks typically appear as single protocols, or protocols that correspond to a single layer of the OSI network reference model (protocol stack). The result is a wide variety of protocols which provide solutions to very specific problems and environments. In this paper, we introduce an architecture for secure networks, which is based on layers, in analogy to the OSI protocol stack Adoption of a layered approach leads to many advantages in secure network design: modularity, flexibility, ease of standardization, etc. We introduce a reference model with 4 layers and argue that it is suitable for conventional network architectures. We present how layers of the secure network reference model correspond to layers of the OSI protocol stack, and we demonstrate that use of the layers leads to security solutions that resolve several problems of existing security protocols.

UR - http://www.scopus.com/inward/record.url?scp=84962868613&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962868613&partnerID=8YFLogxK

U2 - 10.1109/IWADS.2002.1194655

DO - 10.1109/IWADS.2002.1194655

M3 - Conference contribution

AN - SCOPUS:84962868613

SN - 0780376242

SN - 9780780376243

SP - 95

EP - 100

BT - Proceedings - 2nd International Workshop on Autonomous Decentralized System, IWADS 2002

PB - Institute of Electrical and Electronics Engineers Inc.

ER -