• Title/Summary/Keyword: IPsec protocol

Search Result 101, Processing Time 0.023 seconds

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 (NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석)

  • Kim, Jung-Yoon;Song, Se-Hwa;Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.184-190
    • /
    • 2009
  • WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.

A Model-Based Analysis of Secure Video Transmission Based on IPSec and IPv4

  • Van, Quang-Dao;Wei, Anne;Geller, Benoit;Dupeyrat, Gerard
    • ETRI Journal
    • /
    • v.27 no.2
    • /
    • pp.219-222
    • /
    • 2005
  • A promising solution to protect wired Internet networks is to use the Secure Internet Protocol (IPSec); however, this has some drawbacks, particularly on the quality of service (QoS). This paper aims at evaluating the video traffic QoS in terms of end-to-end delay and packet loss rate. Based on some basic assumptions, our analysis shows that the performance with IPSec is rapidly inferior to the IPv4 performance. We thus suggest adding some QoS parameters into IPSec in order to achieve a compromise between QoS and security.

  • PDF

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Quantum Key Distribution System integrated with IPSec (양자키분배와 IPSec을 결합한 네트워크 보안 장치 연구)

  • Lee, Eunjoo;Sohn, Ilkwon;Shim, Kyuseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.3-11
    • /
    • 2021
  • Most of the internet security protocols rely on classical algorithms based on the mathematical complexity of the integer factorization problem, which becomes vulnerable to a quantum computer. Recent progresses of quantum computing technologies have highlighted the need for applying quantum key distribution (QKD) on existing network protocols. We report the development and integration of a plug & play QKD device with a commercial IPSec device by replacing the session keys used in IPSec protocol with the quantum ones. We expect that this work paves the way for enhancing security of the star-type networks by implementing QKD with the end-to-end IP communication.

Session Key Recovery of IPSec using PKI (공개키를 이용한 IPSec 프로토콜 세션키의 복구)

  • Rhee, Yoon-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.622-625
    • /
    • 2006
  • The basic observation of the present paper is that cryptographic solutions that have been proposed so far completely ignore the communication context. IPSec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the Internet. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.

  • PDF

A Study of better than security in IPSec Key protocol (IPSec에서의 보안강화를 위한 키 프로토콜 연구)

  • Woo, Yeaon-Ok;Hwang, Sung-Chul;Kang, Heung-Seek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1977-1980
    • /
    • 2003
  • 현재 가상사설망(VPN)의 보안 프로토콜로 사용되고 있는 IPSec(IP security)은 보안에 취약한 인터넷망을 타고 전달되는 IP 패킷을 대상으로 패킷의 기밀성과 무결성 및 송신자 인증이라는 보안 서비스를 제공해주는 강력한 인터넷 보안 메커니즘의 하나이다. 그러나 IPSec의 키 분배 및 관리를 위해 사용되고 있는 IKE(Internet Key Exchange)는 그 복잡성으로 인해 정확한 암호학적 분석이 어렵고 이를 응용한 어플리케이션 사이의 상호 호환을 어렵게 하고 있다. 따라서 본 논문에서는 이러한 문제를 해결하기 위해 기존의 IKE를 변형한 새로운 키 알고리즘을 제시한다.

  • PDF

Design of a IPsec's Message Authentication Module HMAC (HMAC를 이용한 IPsec의 Message Authentication Module 설계)

  • Kim, Yong-Hoon;Ha, Jin-Suk;Lee, Kwang-Youb
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.813-816
    • /
    • 2002
  • 현재 인터넷은 IPv4(Internetworking Protocol, version 4)를 사용하고 있다. 하지만 데이터 통신은 1970년대에 IPv4가 나온 이래에 발전을 거듭하여 왔다. IPv4는 빠르게 발전하는 인터넷에의 요구를 수용하기 위해 IPv6가 제안되었고 현재 표준이 되었다. IPv6에서는 암호화와 인증옵션들은 패킷의 신뢰성과 무결성을 등을 제공한다. 인터넷에서의 정보보호는 인터넷을 구성하는 여러 계층에서 이루어 질 수 있지만, IPsec에서는 AH(Authentication Header)프로토콜과 IPsec ESP(Encapsulating Security Payload)프로토콜 두 가지의 암호 프로토콜이 사용되지만 AH에서는 HMAC를 이용한 HMAC-MD5나 HMAC-SHA-1 중 하나를 반드시 기본 인증 알고리즘으로 지원하여야 한다. 본 논문에서는 MD5를 이용한 HMAC-MD5를 기준으로 설계하였으며, Iterative Architecture과 Full loop unrolling Architecture의 두 가지 구조를 설계하였다.

  • PDF

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks

  • Jung, Youn-Chan;Peradilla, Marnel
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.583-590
    • /
    • 2011
  • Full-mesh IPSec tunnels pass through a black ("unsecure") network (B-NET) to any red ("secure") networks (RNETs). These are needed in military environments, because they enable dynamically changing R-NETs to be reached from a BNET. A dynamically reconfiguring security policy database (SPD) is very difficult to manage, since the R-NETs are mobile. This paper proposes advertisement process technologies in association with the tunnel gateway's protocol that sends 'hello' and 'prefix advertisement (ADV)' packets periodically to a multicast IP address to solve mobility and security issues. We focus on the tunnel gateway's security policy (SP) adaptation protocol that enables R-NETs to adapt to mobile environments and allows them to renew services rapidly soon after their redeployment. The prefix ADV process enables tunnel gateways to gather information associated with the dynamic changes of prefixes and the tunnel gateway's status (that is, 'down'/restart). Finally, we observe two different types of performance results. First, we explore the effects of different levels of R-NET movements on SP adaptation latency. Next, we derive the other SP adaptation latency. This can suffer from dynamic deployments of tunnel gateways, during which the protocol data traffic associated with the prefix ADV protocol data unit is expected to be severe, especially when a certain tunnel gateway restarts.

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.