Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management

Slides:



Advertisements
Similar presentations
LinkSec Architecture Attempt 3
Advertisements

EPON Technology Team 2/9/2014 Key Management [802.1af - Issues] Jee-Sook Eun Electronics and Telecommunications Research Institute.
Security in Wireless Networks Juan Camilo Quintero D
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Chapter 20: Network Security Business Data Communications, 4e.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Wireless and Security CSCI 5857: Encoding and Encryption.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
EMU BOF EAP Method Requirements Bernard Aboba Microsoft Thursday, November 10, 2005 IETF 64, Vancouver, CA.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
EPON Technology Team 12/6/2015 Key Management [802.1af - considerations] Jee-Sook Eun Electronics and Telecommunications Research Institute.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Virtual Private Networks
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
Presented by Edith Ngai MPhil Term 3 Presentation
Virtual Private Networks
A DRM Security Architecture for Home Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Virtual Private Network
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Virtual Private Networks
Configuring Windows Firewall with Advanced Security
Chapter 5 : Designing Windows Server-Level Security Processes
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Remote Access Lecture 2.
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
Virtual LANs.
The Internet of Things (IoT)
IEEE Interim May 2004 Allyn Romanow
– Chapter 5 (B) – Using IEEE 802.1x
Virtual Private Network (VPN)
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Goals Introduce the Windows Server 2003 family of operating systems
Kerberos.
Systems Design Chapter 6.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Mobile Agents M. L. Liu.
09/12/2018 Virtual Networks.
Architectures of distributed systems Fundamental Models
Specification of Countermeasures for CYRAIL
The University of Adelaide, School of Computer Science
Architectures of distributed systems Fundamental Models
Final Conference in Paris WP6 – Protection Profiles Specification
Issues/problems encountered and solutions (if any):
Install AD Certificate Services
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Teacher Monica Herrera
Cengage Learning: Computer Networking from LANs to WANs
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Unit 8 Network Security.
Architectures of distributed systems Fundamental Models
Advanced Computer Networks
By Markus Kriechhammer
Integrated Security System
Internet protocol stack
Symmetric Key Distribution
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management 802.1af - issues Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management

Compare of Key Management method Public-key Symmetric-key Off-line set Creation of Private key (If by user, dictionary attack) Creation of Public key Certificate Creation of Master key (recommended by manufacture) Authentication 802.1x Authentication server No need Key distribution Secured channel Secured channel communication Other upper layer No need mobility O (if all authentication servers are connected in network) O (if move within same LAN)

IPsec Vs. Linksec Linksec target IPsec target Rest of the network Attachment Point Network Attachment Point Networked Device Networked Device Networked Device Networked Device Linksec target IPsec target