Packet key-based end-to-end security management on a blockchain control plane
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome t...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Published: |
Animo Repository
2019
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/faculty_research/2349 https://animorepository.dlsu.edu.ph/context/faculty_research/article/3348/type/native/viewcontent |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
id |
oai:animorepository.dlsu.edu.ph:faculty_research-3348 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:faculty_research-33482021-08-24T23:51:03Z Packet key-based end-to-end security management on a blockchain control plane Jung, Younchan Peradilla, Marnel Agulto, Ronnel The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency. 2019-05-02T07:00:00Z text text/html https://animorepository.dlsu.edu.ph/faculty_research/2349 https://animorepository.dlsu.edu.ph/context/faculty_research/article/3348/type/native/viewcontent Faculty Research Work Animo Repository Packet transport networks Blockchains (Databases) Computer security Software-defined networking (Computer network technology) Computer Sciences |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
topic |
Packet transport networks Blockchains (Databases) Computer security Software-defined networking (Computer network technology) Computer Sciences |
spellingShingle |
Packet transport networks Blockchains (Databases) Computer security Software-defined networking (Computer network technology) Computer Sciences Jung, Younchan Peradilla, Marnel Agulto, Ronnel Packet key-based end-to-end security management on a blockchain control plane |
description |
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency. |
format |
text |
author |
Jung, Younchan Peradilla, Marnel Agulto, Ronnel |
author_facet |
Jung, Younchan Peradilla, Marnel Agulto, Ronnel |
author_sort |
Jung, Younchan |
title |
Packet key-based end-to-end security management on a blockchain control plane |
title_short |
Packet key-based end-to-end security management on a blockchain control plane |
title_full |
Packet key-based end-to-end security management on a blockchain control plane |
title_fullStr |
Packet key-based end-to-end security management on a blockchain control plane |
title_full_unstemmed |
Packet key-based end-to-end security management on a blockchain control plane |
title_sort |
packet key-based end-to-end security management on a blockchain control plane |
publisher |
Animo Repository |
publishDate |
2019 |
url |
https://animorepository.dlsu.edu.ph/faculty_research/2349 https://animorepository.dlsu.edu.ph/context/faculty_research/article/3348/type/native/viewcontent |
_version_ |
1709757499703296000 |