Conference Proceedings of the 2003 IEEE International
DOI: 10.1109/pccc.2003.1203741
|View full text |Cite
|
Sign up to set email alerts
|

IPSec overhead in wireline and wireless networks for Web and email applications

Abstract: This research focuses on developing a set of secure communication network testbeds and using them to measure the overhead of IP Security (IPSec) for email and web applications. The network testbeds are implemented using both wireline and wireless technologies. The testing involves a combination of authentication algorithms such as Hashed Message Authentication Code-Message Digest 5 (HMAC-MD5) and Hashed Message Authentication Code-Secure Hash Algorithm 1 (HMAC-SHA1), implemented through different authenticatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…IPSec was the focus of work in [14], where the authors examined the ESP and AH encapsulation overheads. However, a comprehensive picture of IPSec overheads was not presented because the performance penalty associated with the IKE process was not examined.…”
Section: Related Workmentioning
confidence: 99%
“…IPSec was the focus of work in [14], where the authors examined the ESP and AH encapsulation overheads. However, a comprehensive picture of IPSec overheads was not presented because the performance penalty associated with the IKE process was not examined.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the rigid requirement of pre-existing credentials, they are difficult to deploy. In the meantime, they all bear heavy overheads [7,8] in Security Association (SA) management, heavy cryptographic check, and maintaining per-flow states. Similarly, the visa protocols [9] use encryption and data signatures to authenticate a flow of packets.…”
Section: Related Workmentioning
confidence: 99%
“…Note that not all hosts will be allowed to access H 2 . A security policy at H 2 is checked to determine if H 2 accepts this permit request 4 . If it does, it generates an access permit (H 2 's DAP for H 1 ), containing a secure hash value generated based on a secret hash key of H 2 and a plain hash message about H 1 (e.g., H 1 's IP address).…”
Section: Basics Of Lips Architecturementioning
confidence: 99%
“…They require a shared key to be established between access control servers on a per-source-destination basis. Similarly, IPsec and VPNs establish shared keys to secure end-to-end communications with known overheads [4]. Several traceback schemes were proposed to track down attacking sources, such as IP traceback.…”
Section: Introductionmentioning
confidence: 99%