Results 11 to 20 of about 789 (132)

Secure Service Implementation with Slice Isolation and WireGuard

open access: yes2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2022
Accepted for publication in 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
Katina Kralevska
exaly   +3 more sources

WireGuard for Securing Constrained Application Protocol for IoT Devices (CoAP) [PDF]

open access: yes, 2021
With the ever-rising popularity of Internet of Things (IoT) devices, the issue of securing communication between the constrained nodes in the IoT network while still achieving adequate speed and performance is as significant as always. One of the protocols widely used for that purpose is the Constrained Application Protocol (CoAP).
Kazakova, Evgenia
openaire   +3 more sources

Revisiting WireGuard for Line-rate, Scalable Tunneling

open access: yes2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR)
Despite widespread adoption, the WireGuard tunneling mechanism available in the Linux kernel is unable to provide high-speed connectivity in a site-to-site setup when leveraging a standard single-tunnel configuration. In fact, its capability to scale with the number of available CPU cores is limited, even in the presence of a software architecture that
Barone, M.   +3 more
exaly   +2 more sources

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol [PDF]

open access: yes2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise Protocol Framework. This paper presents the first mechanised cryptographic proof of the protocol underlying WireGuard, using the CryptoVerif proof assistant.
Benjamin Lipp, Bruno Blanchet
exaly   +4 more sources

Secure Communication with WireGuard – VPN-as-a-Service in Beyond 5G [PDF]

open access: yes, 2022
Innføring av skivedeling i 5G nettverk åpner for at vertikale virksomheter kan utvikle og benytte sine tjenester ved siden av hverandre i telenett. Sammenliknet med tidligere generasjons mobilnettverk, søker 5G å kunne tilby flere tjenester simultant.
Kielland, Sondre Sørensen
openaire   +3 more sources

Key Management for Data Plane Encryption in SDN Using WireGuard [PDF]

open access: yes, 2017
Software Defined Networks (SDNs) decouple the control plane and the data plane, congregating control functions in a designated entity in the network, the controller. The decoupling realizes a highly dynamic network which has benefits such as cost reductions and programmability.
Braadland, Anna Selvåg
openaire   +3 more sources

Wireguard: An Efficient Solution for Securing IoT Device Connectivity

open access: yes
The proliferation of vulnerable Internet-of-Things (IoT) devices has enabled large-scale cyberattacks. Solutions like Hestia and HomeSnitch have failed to comprehensively address IoT security needs. This research evaluates if Wireguard, an emerging VPN protocol, can provide efficient security tailored for resource-constrained IoT systems.
Jumakhan, Haseebullah, Mirzaeinia, Amir
openaire   +2 more sources

Secure remote client connection to higher education institution internal computer network through VPN

open access: yesTaikomieji Moksliniai Tyrimai, 2023
The article analyzes the problem of secure connection of a remote client to the internal computer network of the higher education institution. The most commonly used OpenVPN, Libreswan and WireGuard solutions were evaluated.
Liudvikas Kaklauskas   +1 more
doaj   +1 more source

Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public‐key post‐quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post‐quantum key encapsulation mechanisms (KEMs), whose purpose is to provide
Duong Dinh Tran   +5 more
wiley   +1 more source

High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Secure multiparty computation (MPC) requires the messages transmitted in secure channels which can provide encryption and authorization to the messages. To implement a secure channel for MPC protocols, researchers have tried some communication protocols, such as TLS and Noise. However, these methods have some limitations. These protocols need a trusted
Yunqi Yang, Rui Zhang, Chien-Ming Chen
wiley   +1 more source

Home - About - Disclaimer - Privacy