Article

The Research of VPN on WLAN (PDF)

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

VPN technology is an effective method and easy to realize on WLAN. Several of VPN technologies have already been widely used nowadays. Each of them has its advantages and disadvantages. this paper introduces the working principle of SSL VPN and IPSec VPN, then analyzes these two kinds of VPN scheme of the advantages and disadvantages, finally several aspects such as the field of application the security strategy 、Installation were Analysis and compared.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... In addition, it provides many uses for wireless communication networks to determine both management and security policies within a company. It also enables operators to integrate any isolation level by separating hosts into different broadcast domains [2]. There are a number of reasons to create VLANs, but the primary one is traffic control; as a LAN expands and more network devices are added, the frequency of the broadcast also grows, causing the network to become very data-congested. ...
Article
Full-text available
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
... It discusses SSL architecture in detail for VPN implementation and explains how SSL fits in the context of network security layers and compares IPSec VPNs and other solutions with SSL VPNs. This paper [52] introduces IPSec and SSL through VPN technology, and analyzes both the protocols for advantages and disadvantages considering VPN usage. It compares SSL and IPSec for VPNs on the basis of authentication, encryption, accessibility, scalability, application attacks, and more, thus adding more attack metrics to our set of tests for VPNs in the latter part. ...
Article
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to provide confidentiality and anonymity to communication. Despite this enormous and ubiquitous usage, VPNs come with various security, misconfiguration and performance related issues thereby hindering the users to take maximum advantage of this revolutionary technology. To address this concern, VPN users must choose the most secure and perfect VPN solution for the smooth functioning of daily life activities. Generally, no clear set of directions is available for assisting a common VPN user thereby accentuating the need to develop an elucidated and coherent checklist that thoroughly helps in evaluating any VPN based on its security, performance, auditing, and management function. This research comprehensively surveys VPN Technologies, its features, working principles, and compliance principles that evolved over the last two decades. Based on it, this research presents a new methodology in the form of a feature-enriched template to comprehensively analyze a VPN solution. Each VPN feature is given its score against the potential damage it may cause in case of failure and the probability of occurrence of that failure. In this way, the corporate sector and individual users can quantitatively and qualitatively grade available options while choosing a VPN and use it effectively.
... This will replaces Wired Equivalent Privacy (WEP) solutions. It adopts standard encryption algorithms to ensure the security of data transmission [7]. Furthermore, VPN usually implemented with the aid of IP security (IPSec). ...
... This will replaces Wired Equivalent Privacy (WEP) solutions. It adopts standard encryption algorithms to ensure the security of data transmission [7]. Furthermore, VPN usually implemented with the aid of IP security (IPSec). ...
Article
Full-text available
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different scenarios and different form application traffic applied. Simulation results showing throughput, delay, servers traffic sent and received have been collected and presented. The results clearly show that there is impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher than that on the delay. Furthermore, the impact show that the email traffic is more affected than web traffic.
... This will replaces Wired Equivalent Privacy (WEP) solutions. It adopts standard encryption algorithms to ensure the security of data transmission [7]. Furthermore, VPN usually implemented with the aid of IP security (IPSec). ...
Article
Full-text available
Energy consumption is one of the important challenge in WSNs deployment and applications. This is because power of WSNs is limited by battery which is difficult if not impossible to replace or recharge in some manner in the sensor nodes. Power consumption can be controlled in WSNs in more than one layer. In this thesis, power efficiency problems and techniques of enlarging battery life using WSNs physical layer are investigated in the second layer MAC sublayer. The latter has been achieved using the multiple access techniques, TDMA and CDMA. Initially, the research attempt to divide the WSN nodes into clusters such that at any time only one specific cluster will operate and the remaining cluster switched off to reduce the power consumption. Each cluster consists of several nodes and one sub-station (SS), all the nodes in one cluster send its data to the (SS) that forwards the data to main station (MS). Furthermore, the link between nodes, SS, and MS is controlled and scheduled such that cluster and node switched to active or sleep modes. Four systems with multi-types of multiple access are proposed and tested. These systems are classified according to the way multiple access provided in the link: TDMA-TDMA-OFDM system, CDMA-CDMA system, CDMA-TDMA-OFDM system, and TDMA-OFDM-TDMA-OFDM system. These systems have been simulated and investigated. By comparing the results of each system with different case of cluster, it has been found that the less consumed power is achieved with 8 clusters of 16 nodes/cluster case. The results also show that the best performance is achieved with CDMA-CDMA system with 8 clusters of 16 nodes/cluster case.
Article
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal). This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Subsequent to acceptance of these Proceedings papers by the responsible Guest Editors, Dr S. Sakthivel, Dr S. Karthikeyan and Dr I. A. Palani, several serious concerns arose regarding the integrity and veracity of the conference organisation and peer-review process. After a thorough investigation, the peer-review process was confirmed to fall beneath the high standards expected by Materials Today: Proceedings. The veracity of the conference also remains subject to serious doubt and therefore the entire Proceedings has been withdrawn in order to correct the scholarly record.
Article
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed,” source addresses. We describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet service providers (ISPs). Moreover, this traceback can be performed “post mortem”-after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology
The security implementation of IPSec VPN [M]
  • R Cariton
  • Davis
Xielin, etc. [translate]. Firewall policy and VPN configuration
  • Etc Lucas
realize the process of handshake for SSL protocol
  • Qi Lin
Technology of IPSec VPN [M]
  • Tianhui Baohong He
Firewall policy and VPN configuration [M]
  • Xielin Lucasetc
IETF RFC4308: Cryptographic Suites for IPSec
  • P Hoffman