• Title/Summary/Keyword: IPSec,IKEv2

Search Result 14, Processing Time 0.015 seconds

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

IPsec VPN Encrypted Packet Analysis Method for Contents Auditing (콘텐츠 감사를 위한 IPsec VPN 패킷 분석 기술 연구)

  • Junghyung Park;Jaenam Yoon;Jaecheol Ryou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.41-52
    • /
    • 2024
  • Security audits of IPsec VPNs are crucial for identifying vulnerabilities caused by implementation flaws or misconfigurations, as well as investigating incidents. Nevertheless, auditing IPsec VPN presents noteworthy challenge due to the encryptiong of network contents which ensere confidentiality, integrity, authentications and more. Some researchers have suggested using man-in-the-middle(MITM) techniques to overcome this challenge. MITM techniques require direct participation in the network and prior knowledge of the pre-shared key for authentication. This causes temporary network disconnection for security audits, and it is impossible to analyse data collected before the audit. In this paper, we present an analysis technique aimed at ensuring network continuity without relying on a specific IPsec VPN topologies or authentication method. Therefore, it is anticipated that this approach will be effective, practical and adaptable for conducting IPsec VPN security

A study on the key management protocols for the Internet (인터넷 키 관리 프로토콜에 관한 연구)

  • Lee, Kye-Sang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.133-140
    • /
    • 2003
  • IKE, which is the standard key management protocol for IPSEC, is said to have several known problems. To resolve the problems of the IKE, two protocol proposals are being discussed in the IETF. the IKE version 2 and Just Fast Keying protocols. They should satisfy several protocol design requirements such as the protocol simplicity, the endurability against DOS attacks, the degree of the PFS, the identity protection, the cryptographic negotiation, and the authentication methods. In this paper, we summarize the characteristics of these two protocols and try to analyze their implications according to the protocol design requirements.

A Study on Next Generation Key Management Protocol for IPsec (IPsec용 차세대 키관리 프로토콜의 동향 및 분석)

  • Kim, Jin;Lee, Sang-Won;Choi, Chul-Jun;Kim, Kwang-Jo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.272-275
    • /
    • 2003
  • 최근 VPN의 구축이 늘어남에 따라, 안전한 VPN을 구축하는 데 있어 강력한 보안기능과 터널기능을 제공하는 핵심 프로토콜인 IPsec의 중요성은 더욱 부각되고 있다. 현재 사용되고 있는 IKE 프로토콜은 기능이 복잡하고 표준규격의 기술(description)이 난해해서 이를 구현한 이기종 제품간에 상호 연동성이 아직까지도 제대로 확보되지 않고 있다. 또한 서비스거부공격에 대한 취약점을 드러내고 있으므로 이들에 대한 보완이 필요하다. 본 논문에서는 이 취약점을 보완하기 위하여 제안된 두 개의 프로토콜 IKEv2와 JEK에 대한 소개와 두 프로토콜의 비교를 한 후, 차세대 키관리 프로토콜로 적합한 것은 이 중 어떤 프로토콜인지 고려해본다.

  • PDF