End-to-end security methods for UDT data transmissions

6Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

UDT (UDP-based data transfer protocol) is one of the most promising network protocols developed for high data speed data transfer. It does not, however, have any inherent security mechanisms, and thus relies on other transport protocols to provide them. Towards its implementation in high speed networks, security and privacy are critical factors and important challenges that need to be addressed. There were substantial research efforts we carried out so far to address these challenges. We introduced security mechanisms through the application layer using UDT's API and presented DTLS, GSS-API, and CGA, in transport and IP layers. In this paper, we make the following contributions: we out line security requirements for UDT implementation and propose practical encryption methods for securing UDT within the network layer. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bernardo, D. V., & Hoang, D. B. (2010). End-to-end security methods for UDT data transmissions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6485 LNCS, pp. 383–393). https://doi.org/10.1007/978-3-642-17569-5_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free