dc.contributor.author |
Drakakis, KE |
en |
dc.contributor.author |
Panagopoulos, AD |
en |
dc.contributor.author |
Cottis, PG |
en |
dc.date.accessioned |
2014-03-01T11:45:03Z |
|
dc.date.available |
2014-03-01T11:45:03Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.issn |
17478405 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/37216 |
|
dc.subject |
Direct-to-user satellite applications |
en |
dc.subject |
DTU |
en |
dc.subject |
EAP |
en |
dc.subject |
Extensible authentication protocol |
en |
dc.subject |
Satellite communications networks security |
en |
dc.subject.other |
Direct-to-user satellite applications |
en |
dc.subject.other |
DTU |
en |
dc.subject.other |
EAP |
en |
dc.subject.other |
Extensible authentication protocol |
en |
dc.subject.other |
Satellite communications networks security |
en |
dc.subject.other |
Authentication |
en |
dc.subject.other |
Communication |
en |
dc.subject.other |
Network security |
en |
dc.subject.other |
Satellite communication systems |
en |
dc.subject.other |
Satellites |
en |
dc.subject.other |
Telecommunication networks |
en |
dc.subject.other |
Network protocols |
en |
dc.title |
Overview of satellite communication networks security: Introduction of EAP |
en |
heal.type |
other |
en |
heal.identifier.primary |
10.1504/IJSN.2009.027342 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1504/IJSN.2009.027342 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
This paper overviews some of the security mechanisms, widely used in satellite communications. The security is analysed by layer and the contribution of each layer is presented both separately and in conjunction with the whole system. Extensible Authentication Protocol (EAP) as a uniform security framework for satellite communication networks and satellite communication Direct-To-User (DTU) services is also presented in the paper. Various EAP-based methods are discussed in relation to the security needs of a satellite communication network, revealing the advantages and the disadvantages of their incorporation. Copyright © 2009, Inderscience Publishers. |
en |
heal.journalName |
International Journal of Security and Networks |
en |
dc.identifier.doi |
10.1504/IJSN.2009.027342 |
en |
dc.identifier.volume |
4 |
en |
dc.identifier.issue |
3 |
en |
dc.identifier.spage |
164 |
en |
dc.identifier.epage |
170 |
en |