Enhancement in SNMP services with improved security with the impact of SSH, TLS and DTLS protocols

2017 
Since decades, there has been many efforts to make Simple Network Management Protocol popularly called as SNMP. The study has revealed a protocol, based on review published in 2002, which includes User-based Security Model (USM), which comprise of users and key-management infrastructure issues. Since that period the network operators have been reporting that deployment of another user with key management infrastructure for securing SNMP is an expensive proposition and a appropriate reason to defy deployment of SNMPv3. This paper narrates how existing security protocols operate above the transport layer and beneath application protocol render a secured SNMP. These protocols can take gain of deployed key management infrastructures that are employed in other network management interface and this would incur less operational costs linked with secured SNMP. The objective of this paper is focus on performance analysis of a model implementation, comparing the functioning and performance of SSH, SNMPv3, TLS, and DTLS with other flavors of SNMP. The paper also attempts to study the differences among diverse options to secure SNMP and offer strategies for selecting solutions to apply or deploy.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    6
    References
    0
    Citations
    NaN
    KQI
    []