CFP last date
20 January 2025
Reseach Article

A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network

by Jayanthi Gokulakrishnan, V. Thulasi Bai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 7
Year of Publication: 2012
Authors: Jayanthi Gokulakrishnan, V. Thulasi Bai
10.5120/7636-0719

Jayanthi Gokulakrishnan, V. Thulasi Bai . A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network. International Journal of Computer Applications. 49, 7 ( July 2012), 1-4. DOI=10.5120/7636-0719

@article{ 10.5120/7636-0719,
author = { Jayanthi Gokulakrishnan, V. Thulasi Bai },
title = { A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 7 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number7/7636-0719/ },
doi = { 10.5120/7636-0719 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:37.882933+05:30
%A Jayanthi Gokulakrishnan
%A V. Thulasi Bai
%T A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 7
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and securely. In this paper, we propose a topology aware reliable routing protocol for inter-domain routing in VPN which securely transfers the data. By simulation results, we show that our proposed protocol is better than the traditional routing protocols of VPN.

References
  1. Alwin Thomas and George Kelley, "Cost-Effective VPN-Based Remote Network Connectivity Over the Internet", 2003.
  2. Seifedine Kadry and Wassim Hassan, "Design and Implementation of System and Network Security for an Enterprisse with Worldwide Branches", Journal of Theoretical and Applied Information Technology, ©2005 - 2008 JATIT. .
  3. E. Ramaraj and S. Karthikeyan, "A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking", Journal of Computer Science 2 (9): 672-675, 2006, ISSN 1549-3636, © 2006 Science Publications.
  4. Christoforos Ntantogian and Christos Xenakis, "A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks", the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07).
  5. Lookman Fazal, Sachin Ganu, Martin Kappes, A. S. Krishnakumar and P. Krishnan, "Tackling Security Vulnerabilities in VPN-based Wireless Deployments", 7 Jan 2008.
  6. Vassilis Prevelakis and Angelos Keromytis, "Designing an Embedded Firewall/VPN Gateway", this work was supported by DARPA under Contract F39502-99-1-0512-MOD P0001
  7. G. Malkin. Routing Information Protocol Version 2. RFC 2453, SRI Network Information Center, November 1998.
  8. J. Moy. OSPF Version 2. RFC 2328, Apr. 1998.
  9. R. Callon. Use of OSI IS-IS for Routing in TCP/IP and Dual Environments. RFC 195, Dec. 1990.
  10. Network Siimulator, http://www. isi. edu/nsnam/ns
Index Terms

Computer Science
Information Sciences

Keywords

VPN Topology-aware Protocol Gateway Authentication