SlideShare a Scribd company logo
Communication
Security
Introduction
• A communication system can be
described as a set of nodes connected
with links.
• Information can be processed and stored
inside a node and transmitted from one
node to another through the links.
• In Communication the security protection has to be
applied together with an actual communication protocol,
for example, Internet Protocol (IP).
• Integrity and authenticity are two inseparable features
in communication. Integrity is to guarantee that the
information received is the same as it is sent.
Authenticity is to guarantee that the originator appears
to the receiver is its actual originator.
• The protected communications are the communications
with one or all the security properties: confidentiality,
integrity, and authenticity.
Protection
• Mutual authentication - Each of the nodes must be
insured with whom to communicate, i.e., the entity
authentication.
• Key establishment - The key establishment must be
authenticated so that each node will know with whom
the keys are established. For each key, both nodes
must agree on its usage.
• Protected negotiation - The two nodes need to
negotiate which mechanisms will be applied to the
communications, for example, encryption,
authentication, etc.
• Failure detection - Once the protected communication
starts, each node shall be able to detect failures for the
protection. That is, if one of the nodes is fail to apply the
agreed protection, then the another node shall detect
the failure and response properly.

More Related Content

PPTX
Network security & cryptography
PPTX
Security in wireless sensor networks
PPT
N5 security precautions
PDF
PPTX
Presentation1 new (1) (1)cf
PPT
Nw sec
PPTX
Wireless and Internet Security Principles
PPTX
Steganography
Network security & cryptography
Security in wireless sensor networks
N5 security precautions
Presentation1 new (1) (1)cf
Nw sec
Wireless and Internet Security Principles
Steganography

What's hot (18)

PPTX
Steganography
PDF
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
PPTX
PPTX
Most Advanced Wireless Security Training : Tonex Training
PPTX
Ppt.1
PPTX
Firewall
PDF
Sw2 b12
ODP
Week13
PDF
Week13
ODP
Week13
PDF
Eng12
PPTX
Internet secutity ppt by vaishnavi khandelwal
PDF
Homework4
PPT
Securityand encryption
PPSX
Secure your public WiFi
PDF
Week11
PPT
INTRODUCTION TO SECURITY
Steganography
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Most Advanced Wireless Security Training : Tonex Training
Ppt.1
Firewall
Sw2 b12
Week13
Week13
Week13
Eng12
Internet secutity ppt by vaishnavi khandelwal
Homework4
Securityand encryption
Secure your public WiFi
Week11
INTRODUCTION TO SECURITY
Ad

Similar to Models For Communication Security (20)

PDF
End end-security
PPTX
Secure communication in Networking
DOCX
Network Security Essentials Applications and StandardsSixth E.docx
DOCX
Network Security Essentials Applications and StandardsSixth E.docx
DOCX
Network Security Essentials Applications and StandardsSixth E.docx
PPT
Network Security Chapter 7
PPTX
Secure communication
PPTX
Ch1 Cryptography network security slides.pptx
PPTX
Network security & cryptography
PDF
DataCommunication Network - Unit 5.pdf
PDF
Internet Protocol Security as the Network Cryptography System
PDF
ch01.pdf
PPT
Network security
PPTX
CNS new ppt unit 1.pptx
PDF
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
PPT
VIT311 Network Security Essentials Unit 1.ppt
DOCX
network security
PPTX
Unit 1-NETWORK Security.pptx............
PDF
Module 2.Cryptography and Cryptanalysis
End end-security
Secure communication in Networking
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Chapter 7
Secure communication
Ch1 Cryptography network security slides.pptx
Network security & cryptography
DataCommunication Network - Unit 5.pdf
Internet Protocol Security as the Network Cryptography System
ch01.pdf
Network security
CNS new ppt unit 1.pptx
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
VIT311 Network Security Essentials Unit 1.ppt
network security
Unit 1-NETWORK Security.pptx............
Module 2.Cryptography and Cryptanalysis
Ad

More from AkNirojan (14)

PPTX
Software Security
PPTX
Hardware Security
PPTX
Data Security
PPTX
Computer Security
PPTX
Basics of Programming
PPTX
Ruby And Ruby On Rails
PPTX
Team Work
PPTX
Communication Or Common Skills
PPT
Belbin Team Roles
PPTX
Individual Team Dynamics
PPTX
Effective Time Management
PPTX
Continue Professional Development
PPTX
Communication Styles
PPTX
Networking Components
Software Security
Hardware Security
Data Security
Computer Security
Basics of Programming
Ruby And Ruby On Rails
Team Work
Communication Or Common Skills
Belbin Team Roles
Individual Team Dynamics
Effective Time Management
Continue Professional Development
Communication Styles
Networking Components

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
assetexplorer- product-overview - presentation
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Cost to Outsource Software Development in 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Advanced SystemCare Ultimate Crack + Portable (2025)
Patient Appointment Booking in Odoo with online payment
Navsoft: AI-Powered Business Solutions & Custom Software Development
assetexplorer- product-overview - presentation
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
iTop VPN Free 5.6.0.5262 Crack latest version 2025
wealthsignaloriginal-com-DS-text-... (1).pdf
Download FL Studio Crack Latest version 2025 ?
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Nekopoi APK 2025 free lastest update
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Operating system designcfffgfgggggggvggggggggg
Cost to Outsource Software Development in 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Odoo Companies in India – Driving Business Transformation.pdf
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps

Models For Communication Security

  • 2. Introduction • A communication system can be described as a set of nodes connected with links. • Information can be processed and stored inside a node and transmitted from one node to another through the links.
  • 3. • In Communication the security protection has to be applied together with an actual communication protocol, for example, Internet Protocol (IP). • Integrity and authenticity are two inseparable features in communication. Integrity is to guarantee that the information received is the same as it is sent. Authenticity is to guarantee that the originator appears to the receiver is its actual originator.
  • 4. • The protected communications are the communications with one or all the security properties: confidentiality, integrity, and authenticity.
  • 5. Protection • Mutual authentication - Each of the nodes must be insured with whom to communicate, i.e., the entity authentication. • Key establishment - The key establishment must be authenticated so that each node will know with whom the keys are established. For each key, both nodes must agree on its usage.
  • 6. • Protected negotiation - The two nodes need to negotiate which mechanisms will be applied to the communications, for example, encryption, authentication, etc. • Failure detection - Once the protected communication starts, each node shall be able to detect failures for the protection. That is, if one of the nodes is fail to apply the agreed protection, then the another node shall detect the failure and response properly.