Abstract
The continuous demand of huge volume of data with high speed has led to the addition of advanced and upgraded network elements (NEs) into the network. The network has dynamically been changing. In such a scenario, security becomes one of the major issues. Topology hiding, which secures the address of the NEs, can prevent the attacks intended for unauthorized access to NEs or interrupt the network services. This paper presents an implementation of Diameter protocol in GNS3 simulator using UNIX platform. Diameter protocol supports topology hiding and unauthorized access to NEs, thus providing security to connected NEs in the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Divya Jha, Bimlendu Shahi, Dr. Suresh D, and Dr. Dushyanth N D. (2017). “Role of Equipment Management In Optical Transport Network.” International Journal of Research—Granthaalayah, 5(4) RACEEE, 155–160.
Donald Eugene Wallace, David Michael Sprague, Jonathan James Palmer, Thomas Michael Wagner, Jeffrey Alan Craig, “Methods, systems, and computer readable media for routing diameter messages at a diameter signaling router”, US9647936B2, May 2017.
Jörg Ewert, Lennart Norell, Soner Yamen, “Diameter Signaling Controller in next-generation signaling networks”, Ericsson Review, 2012.
Bimlendu Shahi, Divya Jha, Dr. Dushyanth N D, and Dr. Suresh D. “Recent Advances In Optical Network Technologies And Its Role In Telecommunication Industry.” International Journal of Research—Granthaalayah, 5(4) RACEEE, 15–22, 2017.
Ivana Savkovic, Robert A. Mann, Mike Vihtari, “Hiding Diameter Network Topology”, US0227394A1, Aug 2016.
Vinay Kumar, S.B., Kumar, P., Shahi, B., Jha, D. and Monica, B.V., “Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies”, Procedia Computer Science, 78, pp. 415–422, 2016.
Gabriel-Cătălin Cristescu, Victor Croitoru, Vlad Sorici, “Implementing an AAA-RADIUS Solution Based on Legacy Authentication Protocols”, IEEE, 2016.
Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen, Antti Evesti, “Mitigating loT Security Threats with a Trusted Network Element”, International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2016.
Sonali Patra, N C Naveen, Omkar Prabhakar, “An Automated Approach For Mitigating Server Security Issues”, International Conference On Recent Trends In Electronics Information Communication Technology, IEEE, May 2016.
Sam Eric McMurry, Ben Allen Campbell, Robert James Sparks, “Methods, systems, and computer readable media for diameter load and overload information and virtualization”, US 9537775 B2, 2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jha, D., Shahi, B., Dushyanth, N. (2019). Topology Hiding of Connected Network Elements Using Diameter Protocol. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 32. Springer, Singapore. https://doi.org/10.1007/978-981-10-8201-6_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-8201-6_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8200-9
Online ISBN: 978-981-10-8201-6
eBook Packages: EngineeringEngineering (R0)