Security requirements and mechanisms of peer-to-peer-based telecommunication networks |
 |
Because of the obvious merits of peer-to-peer (P2P) networks (such as lower cost, scalability and fault tolerance), some operators began to consider the possibility of constructing the next-generation kernel network based on P2P. In order to implement an operable and manageable P2P-based telecommunication network, the security solution must be a critical part of it.
The distributed service network (DSN) defined in Recommendations ITU-T Y.2206 and ITU-T Y.2080 is designed as a telecommunication network based on P2P. The capability requirements and the functional architecture are defined in Recommendations ITU-T Y.2206 and ITU-T Y.2080, respectively; however, the security aspects are not addressed in either of these two Recommendations. The security requirements and mechanisms defined in Recommendation ITU-T X.1163 complement the DSN-related work.
Recommendation ITU-T X.1163 provides a security guideline for a telecommunication network based on P2P technology. It briefly introduces the characteristics of the network, it also analyses the security requirements of the network and the services, and it specifies the security mechanisms to fulfil these requirements.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/12476 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1160-X.1164: Peer-to-peer security |
Approval date: |
2015-05-29 |
Provisional name: | X.p2p-3 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1163 (05/2015)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Current and new challenges for public-key infrastructure standardization
|
2014
|
here
|
|