2011 9th International Conference on Emerging eLearning Technologies and Applications (ICETA) 2011
DOI: 10.1109/iceta.2011.6112567
|View full text |Cite
|
Sign up to set email alerts
|

Performance comparison of IPsec and TLS based VPN technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 3 publications
0
18
0
Order By: Relevance
“…This security provision involves creating a secure connection or tunnel between two endpoints (client and server). To create this tunnel, IPsec has to use a handshake protocol called Internet Key Exchange (IKE) to establish the connection so that endpoints can securely send IP packets [7]. IPsec significantly provide information integrity, authentication and data encryption [17].…”
Section: Overview Of Ip Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…This security provision involves creating a secure connection or tunnel between two endpoints (client and server). To create this tunnel, IPsec has to use a handshake protocol called Internet Key Exchange (IKE) to establish the connection so that endpoints can securely send IP packets [7]. IPsec significantly provide information integrity, authentication and data encryption [17].…”
Section: Overview Of Ip Securitymentioning
confidence: 99%
“…Moreover, for IPsec to achieve these functionalities it requires using two protocols; Authentication Header (AH) and Encapsulating Security Payload (ESP) [1] [15]. IPsec is client/server protocol that set to only ship data between VPN endpoints [7]. IPsec is used in two fashions, tunnel mode or transport mode and each IPsec security protocol has a transport mode and tunnel mode.…”
Section: Overview Of Ip Securitymentioning
confidence: 99%
“…This numerical study evaluates four scenarios (ω 1 − ω 4 ) whose values are presented in Table II including access indices of objects o 1 and o 2 associated with s 1 (α s1,o1 and α s1,o2 ) and s 2 (α s2,o1 and α s2,o2 ), the normalized number of attacks of each threat (Υ[T Table III (at the top of the next page) which are synthesized from data in [16]- [18], [25] and parameters in Table II. TABLE III BENEFIT VALUES OF ACCESS PERMISSIONS ( βs,o,p,z,ω ) AND SECURITY CONTROLS (βo,c,v,z,ω ).…”
Section: A Numerical Studymentioning
confidence: 99%
“…Security setting v 2 of the VPN control (c 1 ) is allocated to both objects in every contextual state due to its higher effectiveness than v 1 as shown in Table I e.g. a TLS-based VPN server using 256-bit AES keys (v 2 ) is more secure than a PPTP-based VPN server (v 1 ) [25]. In contrast, although the effectiveness of v 2 of the lock screen control (c 3 ) is lower than that of v 1 , v 2 is applied to both objects in every contextual state e.g.…”
Section: A Numerical Studymentioning
confidence: 99%
“…VPN technology that we propose for protection could be implemented using different protocols. Performance of two most common, IPsec and TLS, are compared in [13].…”
Section: Related Workmentioning
confidence: 99%