Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
The Twofish encryption algorithm: a 128-bit block cipher
The Twofish encryption algorithm: a 128-bit block cipher
Stream control transmission protocol (SCTP): a reference guide
Stream control transmission protocol (SCTP): a reference guide
The Design of Rijndael
UNIX Network Programming, Vol. 1
UNIX Network Programming, Vol. 1
Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths
IEEE/ACM Transactions on Networking (TON)
An End-to-End Security Solution for SCTP
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
The Design and Message Complexity of Secure Socket SCTP
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Hi-index | 0.00 |
This paper describes the design and implementation of secure socket SCTP (S2SCTP). S2SCTP is a new multi-layer, end-to-end security solution for SCTP. It uses the AUTH protocol extension of SCTP for integrity protection of both control and user messages; TLS is the proposed solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption at the socket library layer. S2SCTP is designed to offer as much security differentiation support as possible using standardized solutions and mechanisms. In the paper, S2SCTP is also compared to SCTP over IPsec and TLS over SCTP in terms of packet protection, security differentiation, and message complexity. The following main conclusions can be draw from the comparison. S2SCTP compares favorably in terms of offered security differentiation and message overhead. Confidentiality protection of SCTP control information is, however, only offered by SCTP over IPsec.