Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anna Brunström is active.

Publication


Featured researches published by Anna Brunström.


availability, reliability and security | 2008

An End-to-End Security Solution for SCTP

Stefan Lindskog; Anna Brunström

The stream control transmission protocol (SCTP) is a fairly new transport protocol that was initially designed for carrying signaling traffic in IP networks. SCTP offers a reliable end-to-end (E2E) transport. Compared to TCP, SCTP provides a much richer set of transport features such as message oriented transfer, multistreaming to handle head- of-line blocking, and multihoming for enhanced failover. These are all very attractive features, but at the same time proven hard and complex to secure for E2E transports. All existing security solutions have limitations. In this paper, a survey of existing solutions is first given. Then, an alternative solution is proposed. The proposed solution uses the new authenticated chunks for SCTP for integrity protection, TLS for key exchange and authentication, and symmetric encryption implemented at the socket layer for confidentiality protection. A qualitative comparison of the described E2E security solutions is also given.


Journal of Networks | 2008

A Conceptual Model for Analysis and Design of Tunable Security Services

Stefan Lindskog; Zoltán Faigl; Anna Brunström

Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices with varying resources tunable security services are needed. A tunable security service is a service that provides different security configurations that are selected, and possibly altered, at run-time. In this paper, we propose a conceptual model for analysis and design of tunable security services. The proposed model can be used to describe and compare existing tunable security services and to identify missing requirements. Five previously proposed services are analyzed in detail in the paper. The analysis illustrates the powerfulness of the model, and highlights some key aspects in the design of tunable security services. Based on the conceptual model, we also present a high-level design methodology that can be used to identify the most appropriate security configurations for a particular scenario.


Archive | 2006

Loss Recovery in Short TCP/SCTP Flows

Per Hurtig; Johan Garcia; Anna Brunström


Archive | 2005

Survey and Classification of Dynamic Data Protection Services for Network Applications

Stefan Lindskog; Anna Brunström; Erland Jonsson


Archive | 2017

Happy Eyeballs for Transport Selection

Anna Brunström; Naeem Khademi; Per Hurtig; Zdravko Bozakov; Karl-Johan Grinnemo


Archive | 2008

Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios

Zoltán Faigl; Péter Fazekas; Stefan Lindskog; Anna Brunström


Proceedings of the Sixteenth IST Mobile & Wireless Communication Summit | 2007

Performance Analysis of IPsec in MIPv6 Scenarios

Zoltán Faigl; Péter Fazekas; Stefan Lindskog; Anna Brunström


Archive | 2006

Providing Tunable Security in IEEE 802.11i Enabled Networks

Zoltán Faigl; Stefan Lindskog; Anna Brunström; Katalin Tóth


Special Session on TCP and MAC Protocols in Wireless and Wired Networks | 2017

AN EXPERIMENTAL STUDY ON THE PERFORMANCE AND FAIRNESS OF LOSS DIFFERENTIATION FOR TCP

Johan Garcia; Anna Brunström


Archive | 2009

Application and Transport Layer Flexibility - A User-influenced Web Browsing System

Johan Garcia; Anna Brunström; Katarina Asplund

Collaboration


Dive into the Anna Brunström's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zoltán Faigl

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Péter Fazekas

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Katalin Tóth

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Erland Jonsson

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge