There are a variety of satellite applications that require application intelligence at intermediate devices for their proper functioning e.g. satellite networks using (Performance Enhancing Proxies, PEPs), real time streaming applications like SIP, H.323 and peer-to-peer applications. Interworking between PEPs and security system has been researched in the past. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and working of PEPs. This paper presents the concept and detailed design of ML-IPSec by breaking the IP datagram into three zones while enabling the intermediate nodes to access the TCP header and HTTP header information. The paper also presents an efficient interworking scheme between M...
A key component of the IP Security architecture is the Internet Key Exchange Daemon (IKE). IKE is in...
Abstract — The paper describes how to provide a set of security services for traffic at the IP layer...
The satellite network does not have the IP layer where the IPsec [2][3] is designed for. Therefore, ...
Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TC...
The traditional modular OSI-layered architecture has served a major role in the development of a var...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Over the past few years, networks which are subject to long delays, high disruptions, asymmetric dat...
To solve the conflict between TCP accelerating technology based on PEP middle node and IPSec protoco...
Mobile computing and security in Internet have become two of the most important challenges in the In...
International audienceIn satellite networks, the security of data exchanged on the satellite segment...
To achieve high throughput in wireless networks, smart forwarding and processing of packets in acces...
Cross-layer architectures (CLAs) are proposed to improve performance in networks where physical laye...
The main characteristics of the satellite channel are large delay and bit error. Both characteristic...
Abstract—Security is an important concern in today’s infor-mation age and particularly so in satelli...
Internet protocol based networking is gaining ground in armed forces, leading to a concept described...
A key component of the IP Security architecture is the Internet Key Exchange Daemon (IKE). IKE is in...
Abstract — The paper describes how to provide a set of security services for traffic at the IP layer...
The satellite network does not have the IP layer where the IPsec [2][3] is designed for. Therefore, ...
Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TC...
The traditional modular OSI-layered architecture has served a major role in the development of a var...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Over the past few years, networks which are subject to long delays, high disruptions, asymmetric dat...
To solve the conflict between TCP accelerating technology based on PEP middle node and IPSec protoco...
Mobile computing and security in Internet have become two of the most important challenges in the In...
International audienceIn satellite networks, the security of data exchanged on the satellite segment...
To achieve high throughput in wireless networks, smart forwarding and processing of packets in acces...
Cross-layer architectures (CLAs) are proposed to improve performance in networks where physical laye...
The main characteristics of the satellite channel are large delay and bit error. Both characteristic...
Abstract—Security is an important concern in today’s infor-mation age and particularly so in satelli...
Internet protocol based networking is gaining ground in armed forces, leading to a concept described...
A key component of the IP Security architecture is the Internet Key Exchange Daemon (IKE). IKE is in...
Abstract — The paper describes how to provide a set of security services for traffic at the IP layer...
The satellite network does not have the IP layer where the IPsec [2][3] is designed for. Therefore, ...