Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A secured, automated, and dynamic end-to-end service level negotiation

Published: 01 February 2013 Publication History

Abstract

Today, the emerging new services like voice over IP and video on demand require some guarantees in terms of QoS. These services can be accessed using wireless technologies, such as Wi-Fi or WiMAX Worldwide Interoperability for Microwave Access. This may make the service delivery vulnerable to security attacks because of the open medium on which wireless technologies are based. Thus, in addition to QoS level, security level must also be guaranteed for the provided services. In this paper, we present the service level negotiation protocol, which ensures a dynamic negotiation of a service level covering both QoS and security. Moreover, the negotiation flow itself could be the target of some malicious attacks. Indeed, these attacks can aim to degrade the service level QoS and / or security or to make an entity, which is involved in a negotiation, unavailable, etc. Thus, the objective of this paper is to study the security of the flow corresponding to the negotiation provided by service level negotiation protocol. In fact, the security required by this flow will be provided through the use of three different mechanisms: Web services security, secure sockets layer, and IP security protocol. Because these security mechanisms may have an impact on the negotiation protocol performances, we will also evaluate this impact to adopt the security solution that allows minimizing it. Copyright © 2012 John Wiley & Sons, Ltd.

References

[1]
Mbarek N, Krief F, Chalouf MA. A negotiation protocol using web services in a self-management framework. Global Information Infrastructure Symposium, GIIS 2007, Moroco, July 2007; pp. pp.93-98.
[2]
Chalouf MA, Delord X, Krief F. Introduction of security in the service level negotiated with SLNP protocol. Second IFIP International Conference on New Technologies, Mobility ans Security, NTMS 2008, Morocco, November 2008.
[3]
Goderis D, Griffin D. Attributes of a service level specification template. IETF, draft-tequila, October 2003.
[4]
Sarangan V, Chen JC. Comparative study of protocols for dynamic service negotiation in the next-generation internet. IEEE Communications Magazine March 2006; Volume 44 Issue 3: pp.151-156.
[5]
Den Bosh SV, Karagiannis G, McDonald A. NSLP for Quality of Service Signaling. IETF Internet draft, draft-ietfnsis-qos-nslp-06, February 2005.
[6]
Nguyen TMT, Boukhatem N, Doudane YG, Pujolle G. COPS-SLS: A service level negotiation protocol for the internet. IEEE Communication Magazine May 2002; Volume 40 Issue 5: pp.158-165.
[7]
Ambient Networks Consortium. Connecting Ambient Networks - Architecture and Protocol Design Release 1. Del. D 3.2, March 2005.
[8]
Chen JC, McAuley A, Sarangan V, Baba S, Ohba Y. Dynamic service negotiation protocol DSNP and wireless diffserv. Proc. ICC, New York, NY, April 2002; pp.1033-1038.
[9]
Duflos S, Kervella B, Gay VC. Considering Security and Quality of Service in SLS to improve Policy-based Mabagement of Multimedia services. ICN-07, Martinique, April 2007.
[10]
Kent S, Seo K. RFC: Security Architecture for Internet Protocol. Request For Comments 4301, December 2005.
[11]
Rescola E, Modadugu N. RFC: Datagram Transport Layer security DTLS. Request For Comments 4347, April 2006.
[12]
IEEE P802.21/D10.0. Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services. IEEE - LAN MAN Standards Committee, April 2008.
[13]
Dierks T, Rescola E. RFC: The Transport Layer Security TLS Protocol Version 1.1. Request For Comments 4346, April 2006.
[14]
Christensen E, Curbera F, Meredith G, Weerawarana S. Web Services Description Language WSDL 1.1. W3C Note, March 2001.
[15]
Bellwood T, Clement L, Ehnebuske D, Hately A. Universal description, discovery and integration UDDI specification. Technical report, OASIS Commitee, July 2002.
[16]
Bray T, Paoli J, Sperberg-McQueen CM, Maler E, Yergeau F. Extensible Markup Language XML 1.0 Fifth Edition. W3C Recommandation, November 2008.
[17]
Nadalin A, Kaler C, Monzillo R, Hallam-Baker P. Web services security specification 1.1. OASIS Standard Specification, OASIS Committee, February 2006.
[18]
Bartel M, Boyer J, Fox B, Lamacchia B, Simon E. XML Signature Syntax and Processing Second Edition. W3C Recommandation, June 2008.
[19]
Imamura T, Dillaway B, Simon E. XML Encryption Syntax and Processing. W3C Recommandation, December 2002.
[20]
Kent S. RFC: IP Authentication Header. Request For Comments 4302, December 2005.
[21]
Kent S. RFC: IP Encapsulating Security Payload. Request For Comments 4303, December 2005.
[22]
Kaufman C. RFC: Internet Key Exchange IKEv2 Protocol. Request For Comments 4306, December 2005.
[23]
Chalouf MA, Krief F. La négociation de niveau de service dans un environnement ubiquitaire. proceedings of NOTERE'09, Montréal, Canada, July 2009 June.
[24]
Chen S, Zic J, Tang K, Levy D. Performance evaluation and modeling of web services security. IEEE International Conference on Web Services, ICWS'07, Salt Lake City, U.T, 2007.
[25]
Mitra N, Lafon Y. Simple Object Access Protocol SOAP 1.2 Part 0: Primer Second Edition. W3C Note, April 2007.
[26]
The Apache Tomcat web page: Available from: http://tomcat.apache.org.
[27]
The Apache Axis web page: Available from: http://ws.apache.org/axis.
[28]
The MySQL web page: Available from: http://www.mysql.com/.
  1. A secured, automated, and dynamic end-to-end service level negotiation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Concurrency and Computation: Practice & Experience
      Concurrency and Computation: Practice & Experience  Volume 25, Issue 2
      February 2013
      129 pages
      ISSN:1532-0626
      EISSN:1532-0634
      Issue’s Table of Contents

      Publisher

      John Wiley and Sons Ltd.

      United Kingdom

      Publication History

      Published: 01 February 2013

      Author Tags

      1. negotiation protocol
      2. performances evaluation
      3. security protocols
      4. service level
      5. web services

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media