2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Download PDF

Abstract

Virtual Private Network (VPN) became one of the most reliable technologies to provide data security - protection, confidentiality, integrity, data origin authentication, replay protection and access control. Effectiveness of mobile VPN (MVPN) depends on multiple factors, including MVPN's selected architectural model, scheme model, topology model, levels of OSI model structure, authentication algorithms, encryption algorithms (ciphers), cipher operation modes, key management protocols, multiple parameters of security protocols, modes of operation and connection modes. This paper presents the outcomes of research project aimed at performance benchmarking of authentication and encryption algorithms for IPsec-based MVPNs.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles