Title :
A Proxy Agent for Small Network-Enabled Devices
Author :
Lu, H. Karen ; Ali, Asad M.
Author_Institution :
Gemalto Inc., Austin, TX
Abstract :
Network-enabled devices use standard Internet TCP/IP protocols and security protocols to communicate with other network nodes. They can provide services and access resources over the Internet. Small network-enabled devices may not have hardware for direct network connections. In this case, they connect to the Internet via host computers, which provide routing, remote access, and network address translation (NAT). However, organizations´ security policies often prevent users from enabling these services. This paper presents a proxy agent to support network-enabled devices while respecting the security policies. The proxy agent uses the web proxy tunneling with added security features. Although proxy tunneling is well defined for web proxy servers, we must resolve several security and deployment related issues in order to adopt it securely for network-enabled devices. The paper describes the application of proxy tunneling and security methods built around this service to solve the routing related problems.
Keywords :
IP networks; Internet; telecommunication security; transport protocols; host computers; network address translation; organization security policies; proxy agent; remote access; routing; security protocols; small network-enabled devices; standard Internet TCP-IP protocols; web proxy servers; web proxy tunneling; Access protocols; Communication standards; Computer networks; Hardware; IP networks; Network address translation; Routing; TCPIP; Tunneling; Web and internet services; Network-enabled devices; Security; Smart cards; Tunneling;
Conference_Titel :
Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE International
Conference_Location :
Austin, Texas
Print_ISBN :
978-1-4244-3368-1
Electronic_ISBN :
1097-2641
DOI :
10.1109/PCCC.2008.4745092