Search results for "Distributed System Security Architecture"
showing 3 items of 3 documents
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
A CAN Fieldbus Based Architecture for Distributed Control Systems Implementation
2003
Abstract The application of distributed systems theory to the implementation of industrial control systems is one of the best options to develop simple, scalable and physically distributed control systems. Following this line, our group has proposed a new architecture based on Rule Nets (RN) as an HLP over CAN fieldbus for the implementation of Distributed Systems. This architecture has been applied to several control applications, obtaining excellent results. The most outstanding feature of the architecture was its simplicity in the control systems design, without any efficiency loss. New capabilities have been added to improve its features and develop new analysis tools, in order to incre…