To see the other types of publications on this topic, follow the link: IPsec.

Journal articles on the topic 'IPsec'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IPsec.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sridevi, Sridevi. "L2TP/IPsec Interworking." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 89–91. http://dx.doi.org/10.15373/22778179/aug2013/28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Said, Muhammad Ali, Setyorini ‏‏‎ ‏‏‎ Setyorini‏‏‎, and Erwid M. Jadied. "Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol." Building of Informatics, Technology and Science (BITS) 4, no. 2 (September 22, 2022): 595–605. http://dx.doi.org/10.47065/bits.v4i2.1836.

Full text
Abstract:
Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations of VPN scalability. DMVPN has a combination of components: Next hop resolution protocol (NHRP), Multipoint Generic Routing Encapsulation (mGRE) and Routing protocol. This research implements a simple network consisting of Hub, Spoke1, Spoke2, Lan1, Lan2 and Lan3 using the GNS3 simulator. This study compares the performance of IPSec and without IPsec on DMVPN using the BGP Routing protocol on performance parameters namely delay, throughput, jitter and packet loss to evaluate the security impact of the DMVPN network. The results of this study indicate that IPSec DMVPN has an effect on sending UDP packets which have a throughput value without IPSec of 5082.18 kbit/s while IPSec's throughput is 5034.40 kbit/s. The value of packet loss without IPSec has a value of 7.54% while IPSec has a value of 4.79%. The results of the jitter value have the same value. The delay value without IPSec has a value of 0.183s while the IPSec delay value is 0.410s. TCP packet delivery has a throughput value without IPSec is 1139.16 kbit/s while the IPSec throughput value is 1105.20 kbit/s. The results of the packet loss value and the jitter value have the same value. The delay value without IPSec has a value of 0.185s while the IPSec delay value is 0.187s.
APA, Harvard, Vancouver, ISO, and other styles
3

Street, Derek. "IPSec Solution." EDPACS 38, no. 5 (November 4, 2008): 6–17. http://dx.doi.org/10.1080/07366980802379871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gengler, Barbara. "IPSec specification." Network Security 1999, no. 11 (November 1999): 5–6. http://dx.doi.org/10.1016/s1353-4858(00)80001-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Xiao Dan, Qiang Yue, and Li Min Su. "The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6." Applied Mechanics and Materials 195-196 (August 2012): 1111–15. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.1111.

Full text
Abstract:
The paper analyzes the principle and key technique of IPSec protocol, researches the security policy and processing flow of IPSec, presents the design ideal and implementation scheme of IPSec based on embedded Linux Operation System. The realization of IPSec mainly consists of five modules. In addition, every module function is discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Full text
Abstract:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that such program can indeed solve the problem of authentication imperfect, thus improving the safety performance of the network.
APA, Harvard, Vancouver, ISO, and other styles
7

Yessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.

Full text
Abstract:
The article is devoted to the study of such technology as IPsec VPN. The role of this technology in the field of information and communication technologies is quite significant. Firstly, IPsec VPN supports many modern encryption algorithms and authentication methods. Secondly, IPsec VPN is supported by many vendors, which allows you to deploy this technology based on equipment from different manufacturers. Thirdly, IPsec VPN does not require much performance from the hardware. Fourth, IPsec VPN is easy to use and easy to monitor. This article shows an example of IPsec VPN implementation on eNSP software environment based on Huawei equipment. As can be seen from the practical part of the article, the creation and implementation of this technology consists of only four steps.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.

Full text
Abstract:
Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”, it has lower security. It makes a detaied analysis on the key technologies in VPN based on IPSec. A design of the IPSec ID authentication building VPN based on certificate is proposed. Finally, in the VMWare simulation experiment has been carried out on the design, experimental results show the design is safe, steady operation and easy to implement.
APA, Harvard, Vancouver, ISO, and other styles
9

Fitrisia, Yuli, and Maruf Alfiando Setianto. "Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate." Jurnal Komputer Terapan 9, no. 2 (December 22, 2023): 212–23. http://dx.doi.org/10.35143/jkt.v9i2.6097.

Full text
Abstract:
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam jaringan lokal itu sendiri, walaupun sebenarnya menggunakan jaringan publik. Pada penelitian ini yang dipakai adalah protokol GRE over IPSec. GRE adalah protokol enkapsulasi yang secara default tidak mendukung keamanan enkripsi. Maka untuk menambahkan lapisan enkripsi di GRE Tunnel dengan dukungan IPSec dan protokol enkripsi IKEv2. Maka dibuat lah kombinasi antara GRE dan IPSec pada Fortigate yang memungkinkan pengguna untuk membuat jalur tuneling aman antara dua jaringan yang berbeda. Seluruh lalu lintas data yang melewati jalur tuneling akan dienkripsi menggunakan protokol IPSec. Setelah berhasil membangun VPN tunnel GRE Over IPSec, kemudian jaringan tersebut di uji. Hasil pengujian terhadap GRE Over IPSec tunnel VPN dengan protokol IKEv2 sudah berjalan dengan baik dan paket yang melalui tunnel tersebut sudah terenkripsi dengan aman. Sedangkan Dari hasil pengujian yang telah dilakukan terhadap performa jaringan GRE over IPSec pada Fortigate dilakukan untuk mengukur performa dari delay dan throughput paket yang dikirim, pengujian dilakukan dua kali pengujian yaitu upload dan download. Menurut THIPON dari jaringan yang dibangun termasuk kedalam kategori “sangat bagus”.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Sunghyuck. "Issues and Security on IPSec: Survey." Journal of Digital Convergence 12, no. 8 (August 28, 2014): 243–48. http://dx.doi.org/10.14400/jdc.2014.12.8.243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

BENHADDAD, Omar Hocine, Mohamed SAOUDI, Amine DROUICHE, Mohamed RABIAI, and Boufeldja ALLAILOU. "Hardware Acceleration of AES Cryptographic Algorithm for IPSec." Malaysian Journal of Computing and Applied Mathematics 2, no. 2 (December 31, 2019): 1–7. http://dx.doi.org/10.37231/myjcam.2019.2.2.30.

Full text
Abstract:
This research considers the offloading of the IPsec packet encryption algorithm into an FPGA by proposing a hardware acceleration of the AES cryptographic algorithm for IPsec. We point out the benefits of relying on HW acceleration in terms of speed and energy efficiency for applications like IPsec. We present the description of the architecture of the proposed solution, the simulation results of our implementation of the AES algorithm in ECB (Electronic Code Book) mode. We also present the integration of the encryption core with the IPsec subsystem through a PCIe bus interface so that the resulting implementation is interoperable with other systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Rhee, Yoon-Jung, Chul-Soo Kim, and Bong-Gyu Lee. "IPSec Key Recovery for IKEv2." Journal of the Korea Academia-Industrial cooperation Society 11, no. 4 (April 30, 2010): 1260–65. http://dx.doi.org/10.5762/kais.2010.11.4.1260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Alsaheel, Abdulellah A., and Ahmad S. Almogren. "A Powerful IPSec Multi-Tunnels Architecture." Journal of Advances in Computer Networks 2, no. 4 (2014): 274–78. http://dx.doi.org/10.7763/jacn.2014.v2.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ariyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Full text
Abstract:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformance
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.

Full text
Abstract:
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Yan, and Ni Hong Wang. "Research on Secure Information Transmission Based on Internet of Things Numerical Control System." Key Engineering Materials 467-469 (February 2011): 1586–91. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1586.

Full text
Abstract:
The development of the Internet of Things (IoT) is on the basis of the secure information transmission, and the same is true for the numerical control system (NC system) based on the IoT (IoT-NC system). If the information is stolen in the process of transmission, the IoT-NC system will not be practical. Compared with the IPSec, the IDSec proposed by this paper is independent with other protocols, which is conducive to further expansion and compatibility, and it could better solve the compatibility problem of the IPSec with the NAT. From the view of transfer process, the IDSec removes the cumbersome process of add and removal IP and TCP header in the IPSec, which will reduce the amount of processing time and transmit data. In the meantime, the IDSec also retains many advantages of the IPSec, such as integrity authentication, origin and destination address authentication, anti-monitoring service, anti-replay service and so on. So, the IDSec is more suitable than the IPSec for the secure information transmission in the IoT.
APA, Harvard, Vancouver, ISO, and other styles
17

Kỷ, Phan Văn, and La Hữu Phúc. "Một giải pháp quản lý kết nối mật cho IPSec trên FPGA." Journal of Science and Technology on Information security 1, no. 13 (December 28, 2021): 3–11. http://dx.doi.org/10.54654/isj.v1i13.142.

Full text
Abstract:
Tóm tắt—IPSec (Internet Protocol Security) là bộ giao thức an toàn nhằm bảo vệlưu lượng dữ liệu qua mạng Internet. Mỗi kết nối mật trong mô hình triển khai IPSec có một bộ thuật toán, tham số bảo mật riêng. Để đảm bảo các kết nối mật hoạt động ổn định trong môi trường truyền tin với băng thông lớn, việc quản lý nhiều kết nối mật đồng thời trên thiết bị IPSec đóng vai trò vô cùng quan trọng. Do tính phức tạp của quá trình quản lý, thông thường vấn đề này được thực hiện bằng phần mềm trên hệđiều hành. Giải pháp này bị hạn chế do quá trình trao đổi dữ liệu giữavi mạch Field Programmable Gate Array (FPGA) và bộ vi xử lý. Trong bài viết này, nhóm tác giả đưa ra một giải pháp tổ chức, quản lý kết nối mật sau khi sử dụng giao thức Internet Key Exchange (IKE) để trao đổi khóa cho IPSec trên FPGA sử dụng ngôn ngữ mô tả phần cứng, nhằm đáp ứng yêu cầu tốc độ cao với nhiều kết nối.Abstract—IPSec (Internet Protocol Security) is a secure protocol aiming to protect data traffic via the Internet. There is a separate set of algorithms and security parameters in each secure connection in the IPSec deployment model. In order to ensure stable connections in high-bandwidth environments, managing multiple secure connections simultaneously on IPSec devices holds a significant role. Due to the complexity of the management process, this is commonly done by software on the operating system. This solution is restricted due to data exchange between field-programmable gate array (FPGA) and microprocessor. In this article, a solution was proposed to organize and manage a confidential connection after using Internet Key Exchange (IKE) to exchange keys for IPSec directly using hardware description language on FPGA, aiming to meet high-speed requirements with many connections.
APA, Harvard, Vancouver, ISO, and other styles
18

Choi, Cheong Hyeon. "Study on WP-IBE compliant Mobile IPSec." Journal of Korean Society for Internet Information 14, no. 5 (October 31, 2013): 11–26. http://dx.doi.org/10.7472/jksii.2013.14.5.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Man Li. "Policy-baseD IPsec management." IEEE Network 17, no. 6 (November 2003): 36–43. http://dx.doi.org/10.1109/mnet.2003.1248659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Seitz, Jochen. "Demystifying the IPsec Puzzle." Computer Standards & Interfaces 24, no. 1 (March 2002): 87. http://dx.doi.org/10.1016/s0920-5489(01)00096-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Choi, Heesook, Hui Song, Guohong Cao, and Thomas F. La Porta. "Mobile multi-layered IPsec." Wireless Networks 14, no. 6 (March 8, 2007): 895–913. http://dx.doi.org/10.1007/s11276-007-0031-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Huang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.

Full text
Abstract:
With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Yunxiao, Bailing Wang, Hongri Liu, Yuliang Wei, Di Wu, and Jing Wang. "Detecting IKEv1 Man-in-the-Middle Attack with Message-RTT Analysis." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/2605684.

Full text
Abstract:
The IPSec has been a widely used VPN (virtual private network) protocol due to its security and convenience. The security of IPsec itself plays a fundamental role in the overall security of the application system. However, it can be found from the existing research that because of some insecurity issues in the application process, the IPsec protocol will suffer from the man-in-the-middle attack. In this paper, we constructed the first experiment environment of IKE (Internet Key Exchange) man-in-the-middle detecting, use normal distribution to detect the RTT (round-trip time), and get 90% of accuracy.
APA, Harvard, Vancouver, ISO, and other styles
24

Sulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Full text
Abstract:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan bahwa dengan adanya VPN IPsec jalur komunikasi menggunakan jaringan publik menjadi lebih aman dengan adanya proses tunneling VPN dan enkripsi dari IPsec
APA, Harvard, Vancouver, ISO, and other styles
25

Aurisch, Thorsten, Tobias Ginzler, Peter Martini, Roger Ogden, Trung Tran, and Hartmut Seifert. "Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management." Journal of Telecommunications and Information Technology, no. 2 (June 25, 2023): 77–83. http://dx.doi.org/10.26636/jtit.2008.2.875.

Full text
Abstract:
Internet protocol based networking is gaining ground in armed forces, leading to a concept described by the NATO as network centric capabilities (NCC). The goal is to enable state-of-the-art, affordable and powerful electronic information services to the troops. A tighter connection of the forces is expected to further enhance the joined strike capabilities. Providing secure information exchange within groups of armed forces is one aspect of the NCC concept. Such group communication is enabled by the multicast feature of the IP technology. Security requirements are met by using the IP security (IPsec) architecture. IPsec enables secure communication between secure private networks via an unsecured public text network. While secure unicast transmission with IPsec is common, only few achievements have been made to secure multicast transmissions. The protection of multicast data traffic of a group in an automated way is described in this document. We utilize an automatic detection of IPsec devices and an efficient key management protocol to reach our aim.
APA, Harvard, Vancouver, ISO, and other styles
26

Cường, Vũ Tá, and La Hữu Phúc. "Xây dựng giải pháp trao đổi khóa IKEv2 sử dụng NIOS II trên FPGA." Journal of Science and Technology on Information security 1, no. 13 (December 28, 2021): 62–70. http://dx.doi.org/10.54654/isj.v1i13.138.

Full text
Abstract:
Tóm tắt—Giao thức Internet Key Exchange (IKE) là một giao thức thực hiện quá trình trao đổi khóa và thỏa thuận trong chế độ bảo mật IPSec. Để thực thi giao thức bảo mật IPSec tốc độ cao thì thường kết hợp giữa phần mềm và phần cứng trên vi mạch Field Programmable Gate Array (FPGA) [7], [8]. Trong đó, các thao tác mật mã, đóng gói và bóc tách gói tin được thực hiện bằng FPGA để đảm bảo thực hiện hệ thống IPSec tốc độ cao; giao thức trao đổi khóa IKE được thực hiện bằng phần mềm sử dụng hệ điều hành Linux nhúng. Trong bài báo này, nhóm tác giả giới thiệu giải pháp thực hiện giải thuật trao đổi khóa IKE sử dụng Nios II trên FPGA. Với cách tiếp cận này, nhóm tác giả đã tự tổ chức, xây dựng chương trình trên bộ vi xử lý, nhờ đó kiểm soát được toàn bộ dòng dữ liệu. Abstract—IKE (Internet Key Exchange) is a protocol that performs key exchange and agreement process in IPSec security mode. To implement high speed IPSec security protocol, it is often combined software and hardware on Field Programmable Gate Array (FPGA) [7], [8]. Therein, encryption, packet encapsulation and extraction operations will be performed by FPGA to ensure high speed IPSec system implementation; the IKE protocol is implemented by software using an embed Linux operating system. In this paper, the authors introduce the solution of implementing IKE key exchange algorithm using Nios II on FPGA. With this approach, the authors have organized and built the program on the microprocessor by themselves, therefore the entire data stream is controlled.
APA, Harvard, Vancouver, ISO, and other styles
27

Jara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.

Full text
Abstract:
Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for constrained devices is feasible.
APA, Harvard, Vancouver, ISO, and other styles
28

Affan, Usman Ibnu, Khairan Marzuki, and Lalu Zazuli Azhar Mardedi. "Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency." International Journal of Engineering and Computer Science Applications (IJECSA) 1, no. 2 (September 30, 2022): 65–76. http://dx.doi.org/10.30812/ijecsa.v1i2.2379.

Full text
Abstract:
VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
APA, Harvard, Vancouver, ISO, and other styles
29

A.A. Adas, A. A. Adas. "Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks." journal of King Abdulaziz University Engineering Sciences 28, no. 1 (January 3, 2017): 31–46. http://dx.doi.org/10.4197/eng.28-1.3.

Full text
Abstract:
This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
30

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar, Manoj, and Amit Kishor. "Network Traffic Encryption by IPSec." International Journal of Computer Sciences and Engineering 7, no. 5 (May 31, 2019): 912–15. http://dx.doi.org/10.26438/ijcse/v7i5.912915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dunbar, Neil. "IPsec Networking Standards — An Overview." Information Security Technical Report 6, no. 1 (March 2001): 35–48. http://dx.doi.org/10.1016/s1363-4127(01)00106-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rowan, Tom. "VPN technology: IPSEC vs SSL." Network Security 2007, no. 12 (December 2007): 13–17. http://dx.doi.org/10.1016/s1353-4858(07)70104-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Markham, Tom, and Chuck Williams. "Key Recovery Header for IPSEC." Computers & Security 19, no. 1 (January 2000): 86–90. http://dx.doi.org/10.1016/s0167-4048(00)86367-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

McClure, Ben. "IPSec for communities of interest." Computers & Security 17, no. 3 (January 1998): 225–26. http://dx.doi.org/10.1016/s0167-4048(98)80328-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Meyer, Helen. "Making IPSec work for you." Computers & Security 18, no. 2 (January 1999): 154. http://dx.doi.org/10.1016/s0167-4048(99)80049-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Hawamde, Al-Muthanna, Adil Khan, and M. Sikander Hayat Khiyal. "IPSec Based Bluetooth Security Architecture." Information Technology Journal 6, no. 4 (May 1, 2007): 478–89. http://dx.doi.org/10.3923/itj.2007.478.489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tisovský, Adam, and Ivan Baroňák. "Methodology for Benchmarking IPsec Gateways." International Journal of Computer Network and Information Security 4, no. 9 (August 14, 2012): 1–9. http://dx.doi.org/10.5815/ijcnis.2012.09.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ishkuvatov, S. "Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel." Proceedings of Telecommunication Universities 8, no. 4 (January 10, 2023): 109–18. http://dx.doi.org/10.31854/1813-324x-2022-8-4-109-118.

Full text
Abstract:
The article proposes a method for determining the composition of protocols used in IPsec communication channel, based on the regularities of the chronology and the lengths of encrypted load packets. The characteristic informative features of the protocols are considered. An algorithm is given to obtain the length values of ESP packets containing arbitrary user data for common modes of IPsec tunnel operation.
APA, Harvard, Vancouver, ISO, and other styles
40

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
41

Guo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (September 24, 2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.

Full text
Abstract:
Owing to the advent and rapid development of Internet communication technology, network security protocols with cryptography as their core have gradually become an important means of ensuring secure communications. Among numerous security protocols, certificate authentication is a common method of identity authentication, and hostname verification is a critical but easily neglected process in certificate authentication. Hostname verification validates the identity of a remote target by checking whether the hostname of the communication partner matches any name in the X.509 certificate. Notably, errors in hostname verification may cause security problems with regard to identity authentication. In this study, we use a model-learning method to conduct security testing for hostname verification in internet protocol security (IPsec). This method can analyze the problems entailed in implementing hostname verification in IPsec by effectively inferring the deterministic finite automaton model that can describe the matching situation between the certificate subject name and the hostname for different rules. We analyze two popular IPsec implementations, Strongswan and Libreswan, and find five violations. We use some of these violations to conduct actual attack tests on the IPsec implementation. The results show that under certain conditions, attackers can use these flaws to carry out identity impersonation attacks and man-in-the-middle attacks.
APA, Harvard, Vancouver, ISO, and other styles
42

Diamond`, Noah, Scott Graham, and Gilbert Clark. "Securing InfiniBand Networks with the Bluefield-2 Data Processing Unit." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 459–68. http://dx.doi.org/10.34190/iccws.17.1.58.

Full text
Abstract:
Interest in securing InfiniBand networks with encryption is growing. However, the performance benefit realized by InfiniBand’s use of Direct Memory Access (DMA) to bypass the kernel and avoid intervention from host Central Processing Units (CPUs) is at odds with IP datagram encryption techniques. Encryption forces data through the CPU before transmission and decryption, incurring multiple clock cycles. The Bluefield-2 Data Processing Unit (DPU) is Nvidia-Mellanox’s latest system on chip that combines a high-performance, programmable processor, network interface card (NIC), and flexible hardware accelerators. This research characterizes the Bluefield-2’s capability to accelerate IPsec encryption in hardware. Results show that the Bluefield-2’s hardware accelerators are capable of supporting a secure IPsec tunnel with a throughput of nearly 16 Gb/s. Offloading IPsec encryption operations to the hardware accelerators on the Bluefield-2 is a promising method for adding confidentiality, integrity, and authentication to InfiniBand networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Hendradi, Prionggo. "PENERAPAN METODE IPSEC UNTUK OPTIMALISASI KONEKSI JARINGAN di PT. OTO MULTIARTHA." JURNAL SATYA INFORMATIKA 1, no. 1 (August 13, 2023): 35–46. http://dx.doi.org/10.59134/jsk.v1i1.422.

Full text
Abstract:
Penerapan Metode IPSec Untuk Optimalisasi Koneksi Jaringan di PT. OTO Multiartha. Dibawah bimbingan Prionggo Hendradi, S.Kom, MMSI dan Faizal Zuli, S.Kom., M.Kom, MTA. PT. OTO Multiartha adalah salah satu perusahaan yang bergerak dibidang pembiayaan keuangan (leasing). kemajuan perusahaan tersebut sangat pesat karena memiliki komitmen dan integritas yang tinggi, sehingga sampai sekarang sudah memiliki banyak cabang yang tersebar di seluruh Indonesia. Dengan banyaknya cabang yang tersebar tersebut, PT. OTO Multiartha memiliki kewajiban penuh untuk melayani cabang-cabang tesebut, baik dari segi pertukaran data, atau pun komunikasi lainnya. Oleh sebab itu PT. OTO Multiartha harus memiliki jaringan yang sangat baik, agar bias memenuhi kebutuhan cabang-cabang tersebut. Maka dengan itu dibutuhkan sebuah jaringan cadangan guna untuk membackup ketika jaringan utama mati, maka dibuatlah sebuah jaringan private pada jaringan internet public dengan menggunakan IPSec sebagai metodenya, karena metode IPSec tersebut sangat menjamin untuk melindungi komunikasi antar cabang dan head office PT. OTO Multiartha.
APA, Harvard, Vancouver, ISO, and other styles
44

Hendradi, Prionggo. "PENERAPAN METODE IPSEC UNTUK OPTIMALISASI KONEKSI JARINGAN di PT. OTO MULTIARTHA." JURNAL SATYA INFORMATIKA 1, no. 1 (August 13, 2023): 35–46. http://dx.doi.org/10.59134/jsk.v1i1.422.

Full text
Abstract:
Penerapan Metode IPSec Untuk Optimalisasi Koneksi Jaringan di PT. OTO Multiartha. Dibawah bimbingan Prionggo Hendradi, S.Kom, MMSI dan Faizal Zuli, S.Kom., M.Kom, MTA. PT. OTO Multiartha adalah salah satu perusahaan yang bergerak dibidang pembiayaan keuangan (leasing). kemajuan perusahaan tersebut sangat pesat karena memiliki komitmen dan integritas yang tinggi, sehingga sampai sekarang sudah memiliki banyak cabang yang tersebar di seluruh Indonesia. Dengan banyaknya cabang yang tersebar tersebut, PT. OTO Multiartha memiliki kewajiban penuh untuk melayani cabang-cabang tesebut, baik dari segi pertukaran data, atau pun komunikasi lainnya. Oleh sebab itu PT. OTO Multiartha harus memiliki jaringan yang sangat baik, agar bias memenuhi kebutuhan cabang-cabang tersebut. Maka dengan itu dibutuhkan sebuah jaringan cadangan guna untuk membackup ketika jaringan utama mati, maka dibuatlah sebuah jaringan private pada jaringan internet public dengan menggunakan IPSec sebagai metodenya, karena metode IPSec tersebut sangat menjamin untuk melindungi komunikasi antar cabang dan head office PT. OTO Multiartha.
APA, Harvard, Vancouver, ISO, and other styles
45

Верховський, Ігор, and Віталій Ткачов. "МЕТОДИ ПОБУДОВИ ВІРТУАЛЬНИХ ТУНЕЛІВ EXTRANET-СИСТЕМ." Scientific review 4, no. 89 (August 27, 2023): 22. http://dx.doi.org/10.26886/2311-4517.4(89)2023.2.

Full text
Abstract:
У статті розглядаються методи побудови віртуальних тунелів для забезпечення безпеки зв'язку в Extranet-системах. Досліджено різні протоколи та технології, такі як IPSec, SSL, TLS, SSH, та порівняно їх ефективність та можливості в різних випадках застосування. Також проаналізовано використання VPN-з'єднань та різні типи мережевих топологій для забезпечення стійкості віртуальних тунелів та максимальної продуктивності мережі. Результати досліджень можуть бути корисні для розробників Extranet-систем та адміністраторів мереж, які шукають ефективні методи захисту мережі та забезпечення стійкості тунелів.Ключові слова: VPN, IPsec, SSL, TLS, SSH.
APA, Harvard, Vancouver, ISO, and other styles
46

Jeong, Won Ho, Lan-Mi Hwang, Bong-Gu Yeo, Ki-Hong Kim, Sang-Hyun Park, Sang-Woon Yang, Jeong-Seok Lim, and Kyung-Seok Kim. "Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 5 (October 31, 2015): 147–54. http://dx.doi.org/10.7236/jiibc.2015.15.5.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Stanton, Ray. "Securing VPNs: comparing SSL and IPsec." Computer Fraud & Security 2005, no. 9 (September 2005): 17–19. http://dx.doi.org/10.1016/s1361-3723(05)70254-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zimmerman, Mark. "IPSec bake off in San José." Infosecurity Today 2, no. 5 (September 2005): 17. http://dx.doi.org/10.1016/s1742-6847(05)70319-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mao-Yin Wang and Cheng-Wen Wu. "A Mesh-Structured Scalable IPsec Processor." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, no. 5 (May 2010): 725–31. http://dx.doi.org/10.1109/tvlsi.2009.2016102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jarmakiewicz, Jacek, Mariusz Bednarczyk, and Jarosław Krygier. "The tactical Intranet IPSec security concept." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2003): 14–18. http://dx.doi.org/10.26636/jtit.2003.4.206.

Full text
Abstract:
The IPSec protocols architecture that can be applied in tactical Intranet based on the IPv6 protocol stack for wireless environment is the subject of the paper. The potential usefulness of the new version of IP protocol is very important for tactical communication systems. Additionally, Internet Engineering Task Force (IETF) security working group proposes recommendations covering the RFC 2401, 2402, 2406, that describe the security architecture for Internet Protocol. These standards, published by IETF are discussed here in military requirements context. The NATO~C3 Technical mbox{Architecture} model also recommends these issues. The concept of the IPSec architecture in military systems is described in the paper. The position of the security applications designed for subscriber devices with reference to layered model is also presented. The concept presented here is defined for the tactical level.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography