2019
DOI: 10.17781/p002557
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Security Virtual Private Network (VPN) Using OpenVPN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 0 publications
0
15
0
3
Order By: Relevance
“…We propose a security model to off-load the security functions, such as VPN and IPv6, the protocol to an internet-facing device, and cluster the IoT sensory environment behind a firewall using Network Address Translation (NAT) to access the IoT using IPv4. However, there are many VPN-based security solutions reported in the literature as each development model varies with the application environment and is not a simple and straightforward solution [10,11,24]. Recently, even in the IoT context, many different ways of implementing the VPN technology are reported [25,26].…”
Section: Proposed Security Model For a Scalable Iot Infrastructurementioning
confidence: 99%
See 4 more Smart Citations
“…We propose a security model to off-load the security functions, such as VPN and IPv6, the protocol to an internet-facing device, and cluster the IoT sensory environment behind a firewall using Network Address Translation (NAT) to access the IoT using IPv4. However, there are many VPN-based security solutions reported in the literature as each development model varies with the application environment and is not a simple and straightforward solution [10,11,24]. Recently, even in the IoT context, many different ways of implementing the VPN technology are reported [25,26].…”
Section: Proposed Security Model For a Scalable Iot Infrastructurementioning
confidence: 99%
“…Hence, the configuring and customizing of OpenVPN needs to be given a unique consideration for different situations. It is also reported in the literature that the VPN fails to comprehend the more advanced and complex threats to the system [24][25][26]. The scope of this paper does not engage in exploring the limitations of the VPN protocol.…”
Section: Introductionmentioning
confidence: 98%
See 3 more Smart Citations