Overhead Analysis of Security Implementation Using IPSec

被引:0
|
作者
Azam, Muhammad Awais [1 ,2 ]
Zaka-Ul-Mustafa [3 ]
Tahir, Usman [2 ]
Ahsan, S. M. [2 ]
Naseem, Muhammad Adnan [2 ]
Rashid, Imran [2 ]
Adeel, Muhammad [1 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
[2] Univ Engn & Technol, Taxila, Pakistan
[3] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Authentication, access Control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true cost of security to be accurately measured. This research work measures the overheads involved in implementation of security using IPSec in different wired/wireless data network protocols.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [1] Parameterization of IPsec Framework for Security in the Smart Grid Interoperability Latency and Throughput IPsec Overhead
    Neumann, Victor
    Gomes, Christian Lyra
    Unsihuay-Vila, Clodomiro
    Fonseca, Keiko V.
    Tones, Pedro Rodrigues, Jr.
    2015 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES LATIN AMERICA (ISGT LATAM), 2015, : 780 - 785
  • [2] The design and implementation of router security subsystem based on IPSEC
    Wu, YH
    Wu, JP
    Xu, K
    Xu, MW
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 160 - 165
  • [3] The design and implementation of IPSec Security Policy LFB on ForCES router
    Lian, Jingwei
    Wang, Weiming
    Gao, Ming
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 548 - 551
  • [4] IPsec/Firewall Security Policy Analysis : A Survey
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    2018 INTERNATIONAL CONFERENCE ON SIGNAL, IMAGE, VISION AND THEIR APPLICATIONS (SIVA), 2018,
  • [5] Analysis and classification of IPSec security policy conflicts
    Li Zhitang
    Cui Xue
    Chen Lin
    FCST 2006: JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2006, : 83 - +
  • [6] Cost overhead analysis associated with IPsec in the next generation satellite network
    Shalmawaz, Iftikhar
    Parikh, Atul
    Pandya, Ameesh
    2008 IEEE AEROSPACE CONFERENCE, VOLS 1-9, 2008, : 1057 - +
  • [7] Overhead Analysis of Security Primitives in Cloud
    Somani, Gaurav
    Agarwal, Akash
    Ladha, Shrutika
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 129 - 135
  • [8] Security architecture for control networks using IPsec and KINK
    Okabe, N
    Sakane, S
    Miyazawa, K
    Kamada, K
    Inoue, A
    Ishiyama, M
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, : 414 - 420
  • [9] A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform
    Wang, Haixin
    Bai, Guoqiang
    Chen, Hongyi
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 58 (03): : 311 - 324
  • [10] A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform
    Haixin Wang
    Guoqiang Bai
    Hongyi Chen
    Journal of Signal Processing Systems, 2010, 58 : 311 - 324