A platform for research: civil engineering, architecture and urbanism
Security for IP‐Based Emergency Services
When considering the security properties of the overall emergency services system, two observations can be made: 1. Emergency services support builds on top of the regular communication infrastructure, and therefore the security properties of the underlying infrastructure are inherited. 2. Security needs to be considered for each and every protocol, since the resulting system is as secure as the weakest link. This chapter discusses some unique security characteristics found in the emergency services environment. First, it describes the communication model and the involved entities of the system. Then, the chapter investigates the adversary model and security threats, illustrating a few attacks on the IP‐based emergency services system. Finally, the chapter concludes with a list of countermeasures. To avoid an attacker modifying the query or its result of any interaction with a Location Information Server (LIS) or a Location to Service Translation (LoST) server, Transport Layer Security (TLS) is recommended. IP networks; security of data
Security for IP‐Based Emergency Services
When considering the security properties of the overall emergency services system, two observations can be made: 1. Emergency services support builds on top of the regular communication infrastructure, and therefore the security properties of the underlying infrastructure are inherited. 2. Security needs to be considered for each and every protocol, since the resulting system is as secure as the weakest link. This chapter discusses some unique security characteristics found in the emergency services environment. First, it describes the communication model and the involved entities of the system. Then, the chapter investigates the adversary model and security threats, illustrating a few attacks on the IP‐based emergency services system. Finally, the chapter concludes with a list of countermeasures. To avoid an attacker modifying the query or its result of any interaction with a Location Information Server (LIS) or a Location to Service Translation (LoST) server, Transport Layer Security (TLS) is recommended. IP networks; security of data
Security for IP‐Based Emergency Services
Tschofenig, Hannes (editor) / Schulzrinne, Henning (editor)
2013-07-12
16 pages
Article/Chapter (Book)
Electronic Resource
English
Internet protocol-based emergency services
TIBKAT | 2013
|British Library Conference Proceedings | 1994
|Automotive engineering | 1977
|NTIS | 1976
|