Skip to main content

Topology Hiding of Connected Network Elements Using Diameter Protocol

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 32))

  • 961 Accesses

Abstract

The continuous demand of huge volume of data with high speed has led to the addition of advanced and upgraded network elements (NEs) into the network. The network has dynamically been changing. In such a scenario, security becomes one of the major issues. Topology hiding, which secures the address of the NEs, can prevent the attacks intended for unauthorized access to NEs or interrupt the network services. This paper presents an implementation of Diameter protocol in GNS3 simulator using UNIX platform. Diameter protocol supports topology hiding and unauthorized access to NEs, thus providing security to connected NEs in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Divya Jha, Bimlendu Shahi, Dr. Suresh D, and Dr. Dushyanth N D. (2017). “Role of Equipment Management In Optical Transport Network.” International Journal of Research—Granthaalayah, 5(4) RACEEE, 155–160.

    Google Scholar 

  2. Donald Eugene Wallace, David Michael Sprague, Jonathan James Palmer, Thomas Michael Wagner, Jeffrey Alan Craig, “Methods, systems, and computer readable media for routing diameter messages at a diameter signaling router”, US9647936B2, May 2017.

    Google Scholar 

  3. Jörg Ewert, Lennart Norell, Soner Yamen, “Diameter Signaling Controller in next-generation signaling networks”, Ericsson Review, 2012.

    Google Scholar 

  4. Bimlendu Shahi, Divya Jha, Dr. Dushyanth N D, and Dr. Suresh D. “Recent Advances In Optical Network Technologies And Its Role In Telecommunication Industry.” International Journal of Research—Granthaalayah, 5(4) RACEEE, 15–22, 2017.

    Google Scholar 

  5. Ivana Savkovic, Robert A. Mann, Mike Vihtari, “Hiding Diameter Network Topology”, US0227394A1, Aug 2016.

    Google Scholar 

  6. Vinay Kumar, S.B., Kumar, P., Shahi, B., Jha, D. and Monica, B.V., “Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies”, Procedia Computer Science, 78, pp. 415–422, 2016.

    Google Scholar 

  7. Gabriel-Cătălin Cristescu, Victor Croitoru, Vlad Sorici, “Implementing an AAA-RADIUS Solution Based on Legacy Authentication Protocols”, IEEE, 2016.

    Google Scholar 

  8. Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen, Antti Evesti, “Mitigating loT Security Threats with a Trusted Network Element”, International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2016.

    Google Scholar 

  9. Sonali Patra, N C Naveen, Omkar Prabhakar, “An Automated Approach For Mitigating Server Security Issues”, International Conference On Recent Trends In Electronics Information Communication Technology, IEEE, May 2016.

    Google Scholar 

  10. Sam Eric McMurry, Ben Allen Campbell, Robert James Sparks, “Methods, systems, and computer readable media for diameter load and overload information and virtualization”, US 9537775 B2, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Divya Jha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jha, D., Shahi, B., Dushyanth, N. (2019). Topology Hiding of Connected Network Elements Using Diameter Protocol. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 32. Springer, Singapore. https://doi.org/10.1007/978-981-10-8201-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8201-6_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8200-9

  • Online ISBN: 978-981-10-8201-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics