• Corpus ID: 15794031

A Survey of VPN Security Issues

@inproceedings{Mohamed2014ASO,
  title={A Survey of VPN Security Issues},
  author={Mohamad Afendee Mohamed and Mohy El-Din A. Abou-El-Seoud and Abdelfettah El-Feki},
  year={2014}
}
Data security plays a crucial role in modern times; most business is transacted over the internet and even to wireless devices, which is much more vulnerable than when running on an internal network. It can be intercepted by non-authorized people; this explains why considerable effort is being devoted at the current time to data encryption and secure transmission. This paper focuses mainly on performing a comparative study of the existing VPN security and encryption techniques. 

Figures from this paper

VPN: Overview and Security Risks

This paper presents an introduction to VPN technology, its working, its types, some of the VPN Protocols, comparison between free and paid VPN services, and security issues associated with VPN use.

IMPROVING QUALITY OF SERVICE THROUGH ROAD SIDE BACK-BONE NETWORK IN VANET

Multi-protocol label switching based on roadside backbone network is introduced to provide widespread, scalable, high-speed, robust quality of services and improve network efficiency and simulation results showed that proposed model improves data transmission and routing performance.

PERBANDINGAN ALGORITMA PADA VIRTUAL PRIVATE NETWORK IPSEC TERHADAP KECEPATAN DATA TRANSFER

Adalah penelitian ini akan melakukan perbandingan algoritma pada teknologi Virtual Private Network (VPN) IPSec terhadap kecepatan transfer data menggunakan tools cisco packet tracer dan hanya membandingkan algor itma DES, 3DES, AES 128, AES 192 dan AES 256.

BACK-BONE NETWORK IN VANET

Multi-protocol label switching based on roadside backbone network to provide widespread, scalable, high-speed, robust quality of services and improve network efficiency and results showed that proposed model improves data transmission and routing performance in terms of data delivery, throughput, end-to-end delay and achieve adequate utilization of resources.

A Survey on Performance Evaluation of VPN on various Operating System

It is found that the all operating systems give different performance metrics values, and various experimental implementations of VPN protocol and algorithm affect the network performance of different Operating Systems by different amounts.

References

SHOWING 1-10 OF 39 REFERENCES

Performance analysis of IPSec protocol: encryption and authentication

  • O. ElkeelanyM. Matalgah J. Qaddour
  • Computer Science
    2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)
  • 2002
HMAC-MD5 can be sufficient for the authentication purposes rather than using the more complicated HMAC-SHA1 algorithm in encryption applications, and comparisons between these algorithms in terms of time complexity and space complexity.

IP Encapsulating Security Payload (ESP)

This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide

Critical vpn security analysis and new approach for securing voip communications over vpn networks

Security presents a big challenge for transmitting voice traffic over the Internet. The goal is to acquire the same security level offered.

A Security Architecture for the Internet Protocol

The design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer, which includes a modular key management protocol, called MKMP, is presented.

Network Security Essentials: Applications and Standards

This book is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors, and serves as a basic reference volume and is suitable for self-study.

Internet Security: Cryptographic Principles, Algorithms and Protocols

Internet Security links them to the technologies in use on the Internet today and is a comprehensive and valuable reference for students, researchers and professional engineers alike -- anyone engaged in the long-term development of secure systems.

The AES-CBC Cipher Algorithm and Its Use with IPsec

This document describes the use of the Advanced Encryption Standard (AES) Cipher Algorithm in Cipher Block Chaining (CBC) Mode, with an explicit Initialization Vector (IV), as a confidentiality

Introduction to Cryptography

This book explains the basic methods of modern cryptography and is written for readers with only basic mathematical knowledge that are interested in modern cryptographic algorithms and their mathematical foundation.

Security Architecture for the Internet Protocol

This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401

Evaluation of the RC4 Algorithm for Data Encryption

The results have been analyzed and interpreted as mathematical equations showing the relationship between the examined data and hence can be used to predict any future performance of the algorithm under different conditions.