CFP last date
20 December 2024
Reseach Article

Article:Performance Analysis of IP Security VPN

by Ritu Malik, Rupali Syal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 4
Year of Publication: 2010
Authors: Ritu Malik, Rupali Syal
10.5120/1202-1393

Ritu Malik, Rupali Syal . Article:Performance Analysis of IP Security VPN. International Journal of Computer Applications. 8, 4 ( October 2010), 5-9. DOI=10.5120/1202-1393

@article{ 10.5120/1202-1393,
author = { Ritu Malik, Rupali Syal },
title = { Article:Performance Analysis of IP Security VPN },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 4 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number4/1202-1393/ },
doi = { 10.5120/1202-1393 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:35.818342+05:30
%A Ritu Malik
%A Rupali Syal
%T Article:Performance Analysis of IP Security VPN
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 4
%P 5-9
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec has become the most common network layer security control and, a widely deployed mechanism for implementing Virtual Private Networks (VPNs). This paper presents analysis of IPSec VPN for videoconference in real time traffic over a secure communication links by implementing an IPSec-based VPN technology.

References
  1. http://nislab.bu.edu/sc546/sc441Spring2003/ip_sec/Why%20it%20is%20important.htm.
  2. Roland, J.F., and Newcomb, M.J., 2003, CSVPN Certification Guide, CISCO Press
  3. Kent S, Atkinson R. Security architecture for the Internet protocol, RFC 2401 , 1998.
  4. L.A. Sanchez, H. Orman. A Roadmap for IPSec Policy Management draft- ietf- ipsp- roadmap- 01.txt, November 16, 2000.
  5. http://technet.microsoft.com/en-us/library/ bb726946.aspx
  6. Doraswamy, N., and Harkins, D., 2003, ‘The New Standard for the Internet, Intranets, and Virtual Private Networks: Prentice-Hall’ ISBN: 013046189-X
  7. Niemi, A., “End-to-end web security – protocol overview”, Department of Computer Science University of Helsinki, Finland, December 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Header (AH) Encapsulating Security Payload (ESP) IP Security (IPSec) Tunnel Transport Virtual Private Networks (VPN) Quality of Service (QoS)