A novel mechanism for improving performance and security of TCP flows over satellite links

Thumbnail Image
Thanthry, Nagaraja
Deshpande, M.
Pendse, Ravi
Issue Date
Conference paper
Aerospace electronics , Air traffic control , Data security , Intelligent systems , Monitoring , Video surveillance
Research Projects
Organizational Units
Journal Issue
N Thanthry; M Deshpande; R Pendse; , "A Novel Mechanism for Improving Performance and Security of TCP Flows over Satellite Links," Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International , vol., no., pp.197-202, Oct. 2006 doi: 10.1109/CCST.2006.313450

Satellite based broadband networks are gaining importance due to their distance insensitivity and high bandwidth availability. Although it is possible to transmit Internet traffic through satellite network, it has been observed that many of the IP related protocols (especially transmission control protocol) do not perform well in the satellite environment due to the high latency and variable round trip time (RTT) offered by the satellite network. Some of the researchers have suggested using performance enhancement proxies (PEP) at strategic locations to improve the transmission control protocol (TCP) performance over the satellite network. However usage of end-to-end security mechanism like IPSec affects the PEP's functioning as the encryption mechanisms generally hide the TCP header information along with the data from intermediate nodes. While other approaches suggest either establishing multiple security associations or sacrificing end-to-end security by using less secure mechanisms like secure shell (SSL) or transport layer security (TLS), the authors of this paper propose a simpler solution for PEP and end-to-end security coexistence. The proposed solution achieves the coexistence of PEP and end-to-end security with minimal overhead as compared to the solutions proposed by other researchers. Initial analysis carried out by the authors indicates a significant overhead reduction and performance improvement in the proposed solution as compared to the other approaches

Table of Contents
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
Book Title
Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International;vol., no., pp.197-202
PubMed ID