CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Integrated Security Architecture for Next Generation Networks

Published on April 2015 by Meenakshi Sundaram. R, Albert Rabara.s, Amutha.j, Daisy Premila Bai.t
National Conference on Advances in Computing Communication and Application
Foundation of Computer Science USA
ACCA2015 - Number 1
April 2015
Authors: Meenakshi Sundaram. R, Albert Rabara.s, Amutha.j, Daisy Premila Bai.t
eaf5f00d-799a-40e4-b381-2064d1e63c08

Meenakshi Sundaram. R, Albert Rabara.s, Amutha.j, Daisy Premila Bai.t . An Integrated Security Architecture for Next Generation Networks. National Conference on Advances in Computing Communication and Application. ACCA2015, 1 (April 2015), 1-6.

@article{
author = { Meenakshi Sundaram. R, Albert Rabara.s, Amutha.j, Daisy Premila Bai.t },
title = { An Integrated Security Architecture for Next Generation Networks },
journal = { National Conference on Advances in Computing Communication and Application },
issue_date = { April 2015 },
volume = { ACCA2015 },
number = { 1 },
month = { April },
year = { 2015 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/acca2015/number1/20097-9001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing Communication and Application
%A Meenakshi Sundaram. R
%A Albert Rabara.s
%A Amutha.j
%A Daisy Premila Bai.t
%T An Integrated Security Architecture for Next Generation Networks
%J National Conference on Advances in Computing Communication and Application
%@ 0975-8887
%V ACCA2015
%N 1
%P 1-6
%D 2015
%I International Journal of Computer Applications
Abstract

NGN is an IP based heterogeneous network environment, converges wired and wireless network technologies, offer a wide range of services to the customers with generalized mobility. It enables the customers to avail unrestricted services from different service providers of different networks, ensures enhanced and consistent services and reduces network and operational complexities. NGN, though, is embedded with unique characteristics of offering voice, data and video services over the same network with guaranteed quality of service, there are numerous critical security issues exist which need to be addressed. There are quite a lot of proposals for the security architecture of the NGN, but the ever growing vulnerabilities, threats and the attacks on NGN environment, demand the necessity for NGN security mechanisms. Hence, in this paper, a novel integrated security architecture for NGN has been proposed.

References
  1. ITU-T Technical Paper. 2013. Migration Scenarios from Legacy Networks to NGN in Developing Countries.
  2. ITU-T Recommendation Y. 2401. 2006. Principles for the Management of the Next Generation Networks.
  3. Graham Titterington. 2011. Developing Secure NGN Infrastructure. OVUM Publications.
  4. T. im Kridel. 2010. Next Generation Network Secuirty. Intel Software Adrenaline.
  5. Tzouanopoulos Dionysis. 2012. Secuirty issues at NGN Networks. University of Piraeus. Piraeus-Greece.
  6. Dr. Mustafa Shakir. 2010. Challenging Issues in NGN Implementation and Regulation. IEEE.
  7. M. Hossein Ahmadzadegan, M. Elmusrati, and H. Mohammadi. 2013. Secure Communication and VoIP Threats in Next Generation Networks. International Journal of Computer and Communication Engineering. Vol. 2, No. 5.
  8. Mi-Jung Choi and James Won-Ki Hong. Towards Management of Next Generation Networks. POSTECH. Korea.
  9. Serap Atay, Marcelo Masera. 2011. Challenges for the security analysis of Next Generation Networks. Information Security Technical Report. Elsevier.
  10. Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Raphael Phan. 2010. Providing Security in 4G Systems: Unveiling the Challenges. Sixth Advanced International Conference on Telecommunications. IEEE.
  11. Yongsuk Park. A Survey of Security Threats on 4G Networks" Samsung Advanced Institute of Technology. Korea.
  12. Jaquith A. 2007. Security Metrics Replacing Fear, Uncertainty and Doubt. Addison Wesley.
  13. A. K. M. Nazmus Sakib, Fauzia Yasmeen, Samiur Rahman, Md. Monjurul Islam, Dr. Md. Matiur Rahaman Mian. Security Thread Analysis & Solution for NGN. International Journal of Engineering Research and Applications. Vol. 1, Issue 4, pp. 1448-1452.
  14. Wafaa Bou Diab, Samir Tohme. 2009. Seamless Handover and Security Solution for Real-Time Services. 11th IEEE International Symposium on Multimedia. IEEE.
  15. Nazrul M. Ahmad and Asrul H. Yaacob. 2010. End to End IPSec Support across IPv4/IPv6 Translation Gateway. Second International Conference on Network Applications, Protocols and Services. IEEE.
  16. Paolo DE LUTIIS. 2010. Managing Home Networks Security Challenges, Security Issues & Countermeasures. IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Ngn Security Vulnerability Threat Ip-mpls Ddos