Results 1 to 10 of about 14,303 (202)

P4-IPsec: Site-to-Site and Host-to-Site VPN With IPsec in P4-Based SDN

open access: yesIEEE Access, 2020
In this work, we present P4-IPsec, a concept for IPsec in software-defined networks (SDN) using P4 programmable data planes. The prototype implementation features ESP in tunnel mode and supports different cipher suites. P4-capable switches are programmed
Frederik Hauser   +2 more
exaly   +3 more sources

IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication

open access: yesIEEE Access, 2020
The introduction of IPsec into software-defined networking (SDN) can secure communication in an SDN southbound interface, i.e., communication between the controllers and the switches.
Ximin Yang, Deqiang Wang, Wan Tang
exaly   +3 more sources

Model Learning and Model Checking of IPSec Implementations for Internet of Things

open access: yesIEEE Access, 2019
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo, Chunxiang Gu, 熹 陈
exaly   +3 more sources

Trust management for IPsec

open access: yesACM Transactions on Information and System Security, 2002
IPsec is the standard suite of protocols for network-layer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how protected traffic should be handled at security end points. This article introduces an efficient policy management scheme for IPsec, based on the principles of trust ...
Blaze, Matt   +2 more
exaly   +4 more sources

Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel

open access: yesFuture Internet
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Daniel Lawo, José Luis Imaña Pascual
exaly   +3 more sources

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate

open access: yesJurnal Komputer Terapan, 2023
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam jaringan lokal itu ...
Yuli Fitrisia, Maruf Alfiando Setianto
doaj   +3 more sources

IPSec VPN Closure Detection Method Based on Side-channel Features [PDF]

open access: yesJisuanji kexue, 2023
IPSec VPN can be divided into closed networks and open networks according to different application scenarios.Closed networks are generally used to customize virtual private networks,and open network proxies are commonly used to avoid network auditing ...
SUN Yunxiao, LI Jun, WANG Bailing
doaj   +1 more source

Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses

open access: yesComputer Science, 2021
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual ...
Try Budi Septiandoko   +2 more
doaj   +1 more source

NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

open access: yesApplied Cybersecurity & Internet Governance, 2022
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj   +1 more source

Home - About - Disclaimer - Privacy