Comparative Analysis of Internet Key Exchange Protocols

被引:0
|
作者
Shaheen, Safdar Hussain [1 ]
Yousaf, Muhammad [1 ]
Majeed, Muhammad Younas [2 ]
机构
[1] Riphah Int Univ, Islamabad, Pakistan
[2] Quaid I Azam Univ, Islamabad, Pakistan
关键词
IPSec; IKE; Key Management; Comparative Analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol (IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of security parameters, generation and management of cryptographic keys, mutual authentication of participating peers and establishing security associations. Since the IPSec security relies primarily on secure IKE, therefore the review and analysis of IKE versions is essential prior to their deployment in IPSec. This paper not only reviews the versions 1 and 2 of IKE but also presents a comparative analysis of these key management protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
    Meadows, Catherine
    Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1999, : 216 - 231
  • [42] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [43] Comment on "Reparable key distribution protocols for Internet environments"
    Lin, XD
    Xing, YS
    Yang, YX
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1998, 46 (01) : 20 - 21
  • [44] Internet of Things Authentication Protocols: Comparative Study
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Alnajim, Abdullah
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 65 - 91
  • [45] Comparative Review of Selected Internet Communication Protocols
    Kaminski, Lukasz
    Kozlowski, Maciej
    Sporysz, Daniel
    Wolska, Katarzyna
    Zaniewski, Patryk
    Roszczyk, Radoslaw
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2023, 48 (01) : 39 - 56
  • [46] Secure deniable authenticated key establishment for Internet Protocols
    Lim, Meng-Hui
    Lee, SangGon
    Park, Youngho
    Moon, Sangjae
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 3 - +
  • [47] Profiles and protocols for the Internet Public-Key Infrastructure
    Adams, C
    Lloyd, S
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 220 - 224
  • [48] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86
  • [49] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24
  • [50] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123