Open Access Open Access  Restricted Access Subscription Access

A Critical Review of Security Mechanisms in Virtual Private Networks


Affiliations
1 Department of Electronics, University of York, York YO10 5DD, United Kingdom
 

This paper discusses about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security mechanisms of VPN are reviewed and analysed in this paper. Security mechanisms as SSL/TLS, IPSEC, etc. which provides encryption and authentication, security between gateways, respectively were summarized.

In this paper we presented some reviews regarding the use, protection, and potential threats used against VPN security technologies and then discussed according to the requirements of these technologies in the VPN. Finally, we presented some conclusions.


Keywords

AH, Authentication, Confidentiality, Encryption, ESP, DoS, HMAC, IKE, IPSEC, SSL/TLS.
User
Notifications
Font Size

Abstract Views: 195

PDF Views: 0




  • A Critical Review of Security Mechanisms in Virtual Private Networks

Abstract Views: 195  |  PDF Views: 0

Authors

Raj Jirapure
Department of Electronics, University of York, York YO10 5DD, United Kingdom
Sanket Jirapure
Department of Electronics, University of York, York YO10 5DD, United Kingdom

Abstract


This paper discusses about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security mechanisms of VPN are reviewed and analysed in this paper. Security mechanisms as SSL/TLS, IPSEC, etc. which provides encryption and authentication, security between gateways, respectively were summarized.

In this paper we presented some reviews regarding the use, protection, and potential threats used against VPN security technologies and then discussed according to the requirements of these technologies in the VPN. Finally, we presented some conclusions.


Keywords


AH, Authentication, Confidentiality, Encryption, ESP, DoS, HMAC, IKE, IPSEC, SSL/TLS.