Anna Brunström
Budapest University of Technology and Economics
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anna Brunström.
availability, reliability and security | 2008
Stefan Lindskog; Anna Brunström
The stream control transmission protocol (SCTP) is a fairly new transport protocol that was initially designed for carrying signaling traffic in IP networks. SCTP offers a reliable end-to-end (E2E) transport. Compared to TCP, SCTP provides a much richer set of transport features such as message oriented transfer, multistreaming to handle head- of-line blocking, and multihoming for enhanced failover. These are all very attractive features, but at the same time proven hard and complex to secure for E2E transports. All existing security solutions have limitations. In this paper, a survey of existing solutions is first given. Then, an alternative solution is proposed. The proposed solution uses the new authenticated chunks for SCTP for integrity protection, TLS for key exchange and authentication, and symmetric encryption implemented at the socket layer for confidentiality protection. A qualitative comparison of the described E2E security solutions is also given.
Journal of Networks | 2008
Stefan Lindskog; Zoltán Faigl; Anna Brunström
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices with varying resources tunable security services are needed. A tunable security service is a service that provides different security configurations that are selected, and possibly altered, at run-time. In this paper, we propose a conceptual model for analysis and design of tunable security services. The proposed model can be used to describe and compare existing tunable security services and to identify missing requirements. Five previously proposed services are analyzed in detail in the paper. The analysis illustrates the powerfulness of the model, and highlights some key aspects in the design of tunable security services. Based on the conceptual model, we also present a high-level design methodology that can be used to identify the most appropriate security configurations for a particular scenario.
Archive | 2006
Per Hurtig; Johan Garcia; Anna Brunström
Archive | 2005
Stefan Lindskog; Anna Brunström; Erland Jonsson
Archive | 2017
Anna Brunström; Naeem Khademi; Per Hurtig; Zdravko Bozakov; Karl-Johan Grinnemo
Archive | 2008
Zoltán Faigl; Péter Fazekas; Stefan Lindskog; Anna Brunström
Proceedings of the Sixteenth IST Mobile & Wireless Communication Summit | 2007
Zoltán Faigl; Péter Fazekas; Stefan Lindskog; Anna Brunström
Archive | 2006
Zoltán Faigl; Stefan Lindskog; Anna Brunström; Katalin Tóth
Special Session on TCP and MAC Protocols in Wireless and Wired Networks | 2017
Johan Garcia; Anna Brunström
Archive | 2009
Johan Garcia; Anna Brunström; Katarina Asplund