• NEWS
  • CURRENT ISSUE
  • CONTACT
GET_pdf delibra

Volume 19 (4) 2013, 209-216

Secure IP Network Model

Apiecionek Łukasz 1, Romantowski Michał 2

1 Kazimierz Wielki University, Bydgoszcz, Institute of Technology
Jana Karola Chodkiewicza 30, 85-064 Bydgoszcz, Poland
E-mail: lapiecionek@ukw.edu.pl

2 Warsaw School of Economics
Niepodległości 162, 02-554 Warszawa, Polska
E-mail: mromantowski@wp.pl

Received:

Received: 14 March 2013; revised: 13 September 2013; accepted: 16 September 2013; published online: 16 October 2013

DOI:   10.12921/cmst.2013.19.4.209-216

OAI:   oai:lib.psnc.pl:457

Abstract:

Although network security is a common concern in almost every network, it appears that no general model for building safe networks has been proposed. The existing models lack a comprehensive approach to the challenges that need to be faced by a modern, publicly accessible IT system. Such approach requires basing on modern access techniques and security mechanisms combination. The authors of this article conducted an examination of the existing IP-related technologies and developed a general secure network model. In this article a general-purpose layered network model is proposed. The presentation is preceded with a summary of the mentioned research. Additionally, the article contains an evaluation summary of two different military systems that have been created basing on the proposed model. The test has been formally executed during CWIX (Coalition Warrior Interoperability eXploration, eXperimentation, eXamination, eXercise) organized by NATO.

Key words:

IP network, network security

References:

[1] ISSC NATO Open Systems Working Group, Allied Data
Publication 34(ADatP-34) NATO C3 Technical Architecture
Volume 2. Architectural Descriptions and Models. Version
7.0, 15.XII.2005
[2] D. Minoli, Security in an IPv6 Environment, Auerbach Publi-
cations 2009, Print ISBN: 978-1-4200-9229-5, eBook ISBN:
978-1-4200-9230-1
[3] J.K. Tudor, Information Security Architecture. An Integrated
Approach to Security in the Organization, Auerbach Publi-
cations 2001, Print ISBN: 978-0-8493-9988-6, eBook ISBN:
978-1-4200-3103-4
[4] S. McClure, Scambray J., Kurtz G., Hacking Exposed Fifth
Edition: Network Security Secrets & Solutions, Osborne, Cal-
ifornia 2005, ISBN 0-07-226081-5
[5] Guidance document on the implementation of gateways
for information exchange between NATO and external
CIS communities version 1.21 dated 16th February 2007,
AC/322(SC/4)N(2007)0007, MULTI REF
[6] Ł. Apiecionek, M. Woźniak, M. Romantowski, W. Znaniecki,
Information assurance in coalition mission environment, Mil-
itary Communications and Information Systems Conference
(MCC), Wrocław 27-29.09.2010
[7] Ł. Apiecionek, M. Romantowski, J. Sliwa, B. Jasiul, R. Go-
niacz, Safe Exchange of Information for Civil-Military Op-
erations. MCC 2011: Military Communications and Infor-
mation Systems Conference, Amsterdam, 17-18.10.2011.
w: Military Communications and Information Technology:
A Comprehensive Approach Enabler. Pod redakcja ̨ Marka
Amanowicza. Warszawa: Redakcja Wydawnictw Wojskowej
Akademii Technicznej, 2011. ISBN 978-83-62954-20-9, s.
39-50 (MK-312)
[8] Olson R., Cyber Security Essentials, Auerbach Publications,
Pages 1-70, Print ISBN: 978-1-4398-5123-4, eBook ISBN:
978-1-4398-5126-5, DOI: 10.1201/b10485-2
[9] M. Chiang, A.R. Calderbank, Layering as Optimization De-
composition: A Mathematical Theory of Network Architec-
tures, Proc. of the IEEE, vol. 95, pp. 255-312, January 2007

  • JOURNAL MENU

    • AIMS AND SCOPE
    • EDITORS
    • EDITORIAL BOARD
    • NOTES FOR AUTHORS
    • CONTACT
    • IAN SNOOK PRIZES 2015
    • IAN SNOOK PRIZES 2016
    • IAN SNOOK PRIZES 2017
  • GALLERY

    vol_19_04_2013
    vol_19_03_2013
    volume_19_2_2013
    volume_19_1_2013
    vol_sp_2_2010
    vol_sp_2006
    vol_sp_1_2010
    vol_16_01_2010
    vol_18_2_2012
    vol_18_01_2012
    vol_17_01_02_2011
    vol_16_02_2010
    vol_15_02_2009
    vol_15_01_2009
    vol_14_02_2008
    vol_14_01_2008
    vol_13_02_2007
    vol_13_01_2007
    vol_12_02_2006
    vol_12_01_2006
    vol_11_02_2005
    vol_11_01_2005
  • CURRENT ISSUE

  • MANUSCRIPT SUBMISSION

    • SUBMIT A MANUSCRIPT
  • FUTURE ISSUES

    • ACCEPTED PAPERS
  • ALL ISSUES

    • 2018
      • Volume 24 (1)
    • 2017
      • Volume 23 (4)
      • Volume 23 (3)
      • Volume 23 (2)
      • Volume 23 (1)
    • 2016
      • Volume 22 (4)
      • Volume 22 (3)
      • Volume 22 (2)
      • Volume 22 (1)
    • 2015
      • Volume 21 (4)
      • Volume 21 (3)
      • Volume 21 (2)
      • Volume 21 (1)
    • 2014
      • Volume 20 (4)
      • Volume 20 (3)
      • Volume 20 (2)
      • Volume 20 (1)
    • 2013
      • Volume 19 (4)
      • Volume 19 (3)
      • Volume 19 (2)
      • Volume 19 (1)
    • 2012
      • Volume 18 (2)
      • Volume 18 (1)
    • 2011
      • Volume 17 (1-2)
    • 2010
      • Volume SI (2)
      • Volume SI (1)
      • Volume 16 (2)
      • Volume 16 (1)
    • 2009
      • Volume 15 (2)
      • Volume 15 (1)
    • 2008
      • Volume 14 (2)
      • Volume 14 (1)
    • 2007
      • Volume 13 (2)
      • Volume 13 (1)
    • 2006
      • Volume SI (1)
      • Volume 12 (2)
      • Volume 12 (1)
    • 2005
      • Volume 11 (2)
      • Volume 11 (1)
    • 2004
      • Volume 10 (2)
      • Volume 10 (1)
    • 2003
      • Volume 9 (1)
    • 2002
      • Volume 8 (2)
      • Volume 8 (1)
    • 2001
      • Volume 7 (2)
      • Volume 7 (1)
    • 2000
      • Volume 6 (1)
    • 1999
      • Volume 5 (1)
    • 1998
      • Volume 4 (1)
    • 1997
      • Volume 3 (1)
    • 1996
      • Volume 2 (1)
      • Volume 1 (1)
    • OLDER ISSUES
  • DATABASES

    • ARTICLES BASE
    • AUTHORS BASE
  • NEWS
  • CURRENT ISSUE
  • CONTACT

Institute of Bioorganic Chemistry Polish Academy of Sciences
Poznań Supercomputing and Networking Center

61-704 Poznań, Z. Noskowskiego 12/14
phone: (+48 61) 858-20-03
fax: (+48 61) 858-21-51