Security Flows Analysis of the ATM Emulated LAN Architecture

  • Maryline Laurent
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


As currently adopted by the ATM Forum LANE SWG, LAN Emulation specifications include many security weaknesses making communications on Emulated LANs (ELANs) vulnerable to heavy threats (in the sense of X800) such as masquerade, information disclosure and denial of service.

This paper aims at highlighting ELAN’s security problems. To this end, a number of attacks scenarios are studied over the ELAN architecture and details relating to the way an attacker may perform each attack — how, from where, with which collusion (if any), which facilities, which level of difficulty — are given.


Security ATM Emulated LAN ATM LAN 


  1. ATM Forum (1994) ATM User-Network Interface Specification, version 3. 1.Google Scholar
  2. Biagioni, E., Cooper, E. and Sansom, R. (1993) Designing a practical ATM LAN. IEEE Network, mars 1993, 32–39.Google Scholar
  3. De Prycker, M. (1991) Asynchronous Transfer Mode: Solution for broadband ISDN Ellis Horwood, New York.Google Scholar
  4. Ellington (1995) LAN Emulation Over ATM, version 1.0, ATMFORUM/94–0021.Google Scholar
  5. IEEE 802.10 (1989) Standard for Interoperable Local Area Network (LAN Security ( SILS) — Part A — The Model, December 1989.Google Scholar
  6. IEEE 802.10 (1990) Standard for Interoperable Local Area Network (LAN Security ( SILS) - Part B- Secure Data Exchange, January 1990.Google Scholar
  7. ITSEM (Information Technology Security Evaluation Manual) — Version 1.0 — September 1993. ITSEC (Information Technology Security Evaluation Criteria) — Version 1.2, Luxembourg, June 1991.Google Scholar
  8. JCSEC (Japanese Computer Security Evaluation Criteria) (1992) Functionality Requirement, Japan Electronic Industry Development Association, Draft Version 1.0, August 1992.Google Scholar
  9. Jeffries, R. (1994) ATM LAN Emulation: the inside story. Data communications, September 1994.Google Scholar
  10. Kaufman, C. Perlman, R. and Speciner, M. (1995) Network Security, Private communication in a public world, Prentice Hall, Englewood Cliffs NJ 07632.Google Scholar
  11. Newman, P. (1994) ATM Local Area Networks, IEEE Communications Magazine, March 1994.Google Scholar
  12. Pierson, L. G. and Tarman, T.D. (1995) ATM Forum / 95-0137 — Requirements for Security Signaling.Google Scholar
  13. Stiller, B. (1995) A survey of UNI signaling systems and protocols for ATM networks, ACM SIGCOM, Vol 25 no 2, 21–33.CrossRefGoogle Scholar
  14. Truong, H.L. Ellington, W.W. Jr., Le Boudec, J.Y. Meier, A.X. and Pace, J.W. (1995) LAN Emulation on an ATM network, IEEE Communications Magazine, May 1995.Google Scholar
  15. UIT-T X.800 (1991) Data communication networks; open systems interconnection (OSI); security, structure and applications. Security architecture for open systems interconnection for CCITT applications.Google Scholar
  16. Vetter, R.J. (1995) ATM concepts, architectures, and protocols, Communications of the ACM, Vol. 38, n° 2, 30–38 109.CrossRefGoogle Scholar
  17. Voydock, V.L. and Kent, S.T. (1983) Security mechanisms in high-level network protocols, ACM Computing Surveys, Vol 15 n0 2, 135–171.MathSciNetCrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • Maryline Laurent
    • 1
  1. 1.Télécom BretagneCessonFrance

Personalised recommendations