• Title/Summary/Keyword: Virtual Private Network(VPN)

Search Result 122, Processing Time 0.027 seconds

Convergence of Related Standard of CC and ISO for Security Evaluation of VPN (VPN의 보안성 평가를 위한 CC와 ISO 관련 표준의 융합)

  • Lee, Ha-Young;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.341-348
    • /
    • 2016
  • Because VPN(Virtual Private Network) uses internet network, the security technique should support it and evaluation technique based on standard should support it. Therefore the method should be organized that can evaluate the security of VPN based on the related standard. In this study, we intended to construct the security evaluation model through combining CC(Common Criteria) which is a evaluation standard and a part of security(Confidentiality, Integrity, Non-repudiation, Accountability, Authenticity) evaluation of ISO which is the standard of software quality evaluation. For this, we analyzed the quality requirements about intra-technology and security of VPN and constructed the evaluation model related to the quality characteristics of two international standard. Through this, we are able to construct a convergence model for security evaluation of VPN. Through accumulating the evaluation practices for VPN in the future, the suitability and validity of the evaluation model must be improved.

The Performance Analysis on Remote Access VPN (원격접속 VPN에 대한 성능분석)

  • Kim, Ji-Hong
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.21-30
    • /
    • 2004
  • A VPN(Virtual Private Network) is constructed using public wires to connect nodes. It can be used like the dedicated line and maintain the security of the data on the VPN. And It uses encryption and other security mechanisms to ensure that only authorized users can access the network. In this paper we summarize IPsec and VPN technology and construct pilot VPN system for analyzing the performance of remote access VPN. Then we analyze the performance of remote VPN system using VPN concentrator in case of single user and in case of multi users.

  • PDF

Mobile IP on MPLS VPN (MPLS VPN에서의 Mobile IP)

  • Lee, Young-Seok;Oh, Myoung-Hwan;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.738-749
    • /
    • 2003
  • Mobile IP protocol introduced in RFC3344 provides a node of the mobility service through IP tunneling mechanism in the IP networks. In this paper, we describe a method to provide a mobility service for VPN(Virtual Private Network) nodes on the MPLS(Multiprotocol Label Switching) network. The MPLS VPN considered here is based on "BGP/MPLS VPNs" presented in RFC2547. PE(Provider′s Edge) routers, which are able to provide VPN services on the MPLS network, are associated with mobility agents to support Mobile IP This proposed mechanism applies when a VPN node moves to other site of the same VPN, or when it moves to other site of a different VPN, or to the ordinary Internet site. We implemented this mechanism in PE routers and analyzed the performance of the MPLS VPN with mobility support on the testbed.

QoS for Mobile MPLS VPN (이동성을 갖는 MPLS VPN에서의 QoS)

  • 송영필;양해권
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.159-163
    • /
    • 2003
  • The term "VPN", or Virtual Private Network, generally means the public network of vendors which is providing a communication net and other network using WWW as a backbone of Its WAN. the existing VPN is expected to reduce expenses and will improve the productivity, however, the network provider should accept the management complexity and the overhead after tunneling and encryption. But MPLS VPN can provide efficient VPN which would not need the address transformation and the additional overhead made by tunneling after giving separately ID. This paper describes the protocol for MPLS VPN which is about a node that moves based on Customer Edge (CE) router and supports a scheme for QoS.

  • PDF

Method for Remotely Accessing the Home Network in the Mobile Environment (이동환경에서 홈 네트워크와 원격으로 연결하는 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Lee, Youn-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.649-651
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) standard enables easy sharing of multimedia contents in the home network environment. However, with the proliferation of mobile computing devices such as smartphones and tablets, the need for media sharing to expand beyond the boundaries of the home network arose. In this paper, a method for accessing DLNA based home network from the mobile environment is proposed. The proposed method uses mobile Virtual Private Network (VPN), and enables easy access to the resources in the home network from the wireless mobile environment.

  • PDF

Provider Provisioned based Mobile VPN using Dynamic VPN Site Configuration (동적 VPN 사이트 구성을 이용한 Provider Provisioned 기반 모바일 VPN)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2007
  • Increase in the wireless mobile network users brings the issue of mobility management into the Virtual Private Network (VPN) services. We propose a provider edge (PE)-based provider provisioned mobile VPN mechanism, which enables efficient communication between a mobile VPN user and one or more correspondents located in different VPN sites. The proposed mechanism not only reduces the IPSec tunnel overhead at the mobile user node to the minimum, but also enables the traffic to be delivered through optimized paths among the (mobile) VPN users without incurring significant extra IPSec tunnel overhead regardless of the user's locations. The proposed architecture and protocols are based on the BGP/MPLS VPN technology that is defined in RFC24547. A service provider platform entity named PPVPN Network Server (PNS) is defined in order to extend the BGP/MPLS VPN service to the mobile users. Compared to the user- and CE-based mobile VPN mechanisms, the proposed mechanism requires less overhead with respect to the IPSec tunnel management. The simulation results also show that it outperforms the existing mobile VPN mechanisms with respect to the handoff latency and/or the end-to-end packet delay.

Implemention of Virtual Private Networks supporting User′s choice service (사용자를 위한 선택적인 서비스 지원의 가상사설망 구현)

  • 김정범;이윤정;이근호;이송희;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.385-387
    • /
    • 2002
  • IETF에서 IPSec(Internet Protocol Security)[1]의 구조를 발표한 이래 IPSec을 이용한 많은 VPN(Virtual PrivateNetwork)[2][3]이 구축되어 왔다. 이렇게 구축된 VPN에서 사용되는 CG(CryptoGate) 혹은 SG(Security Gateway)는 각각의 망에서 게이트 역할을 한다. 하지만 이런 기존의 CG나 SG는 IPSec의 정책을 사용자가 선택하는 것이 아닌 망 관리자가 일방적으로 서비스하도록 설계되어있다. 이러한 점은 사용자가 자신의 데이터를 평가하여 자율적으로 그에 맞는 서비스를 이용하는 것이 아니므로 사용자가 사용하는 것을 꺼릴 수도 있다. 또한 게이트웨이에 자신의 키를 백업할 수 있도록 하여서 사용자가 다시 이 망에 접근할 경우 다시 키 협상을 하는 것이 아닌 백업해둔 키를 가지고 연결할 수 있도록 하였다. 본 논문은 VPN에서 이러한 점을 고려하여 CG를 설계함으로써 VPN 사용의 확장성을 해결한다.

  • PDF

A VPN controlled by CE Routers on MPLS Networks (CE 라우터 기반의 MPLS VPN)

  • Lee, Young-Seok;Han, Min-Ho;Chun, Woo-Jik;Choi, Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.31-39
    • /
    • 2002
  • The VPN(Virtual Private Network) is a private network constructed logically on a public network infrastructure. There have been numerous studies to support the VPN services by using different technologies such as IP in IP, GRE, L2TP, MPLS and so on. Among these technologies, MPLS has shown many merits in aspects of QoS, security, and management, compared with other technologies. As an enhancement of the VPN that is controlled by MPLS PE(Provider Edge) routers, this paper presents the VPN controlled by MPLS CE(Customer Edge) routers. The functional architecture of the CE based VPN and operations of the CE routers are described along with the performance comparison of CE based MPLS VPN. It has been shown that the CE based VPN has more advantages than PE based VPN with respect to independency, scalability, security, and complexity.

Design of an Optical Edge LSR for MPLmS based VPN Service (MPLmS기반의 Optical VPN 서비스를 위한 에지 라우터 설계)

  • 오홍석;김명회;이현태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.301-305
    • /
    • 2002
  • 본 논문에서는 MPLmS(Multiprotocol Lambda Switching) 기반의 Optical VPN 서비스를 제공하는 에지 라우터를 설계하기 위하여 MPLmS 기반의 VPN(Virtual Private Network) 모델과 동작 구조를 기반으로 에지 O-LSR(Optical Label Switching Router)의 기능적 블록을 설계하고 VPN 패킷 전달을 위한 라우팅 테이블을 설계한다.

  • PDF

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.