Overhead Analysis of Security Implementation Using IPSec

被引:0
|
作者
Azam, Muhammad Awais [1 ,2 ]
Zaka-Ul-Mustafa [3 ]
Tahir, Usman [2 ]
Ahsan, S. M. [2 ]
Naseem, Muhammad Adnan [2 ]
Rashid, Imran [2 ]
Adeel, Muhammad [1 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
[2] Univ Engn & Technol, Taxila, Pakistan
[3] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Authentication, access Control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true cost of security to be accurately measured. This research work measures the overheads involved in implementation of security using IPSec in different wired/wireless data network protocols.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [21] Network security using E-DHCP over NAT/IPsec
    Demerjian, J
    Hajjeh, I
    Serhrouchni, A
    Badra, M
    IASTED International Conference on Web Technologies, Applications, and Services, 2005, : 53 - 58
  • [22] Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud
    Singh, Gurjot Balraj
    Jaafar, Fehmi
    Butakov, Sergey
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 952 - 958
  • [23] Towards an IPsec security GeoNet Architecture
    Sahloul, Nesrine Ayed
    Benazzouz, Lamia
    Aouini, Imen
    2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 130 - 134
  • [24] Distributed Logic Encryption: Essential Security Requirements and Low-Overhead Implementation
    Afsharmazayejani, Raheel
    Sayadi, Hossein
    Rezaei, Amin
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 127 - 131
  • [25] Implementation of Software IPsec Communication using ARIA Cipher Algorithm in SDN
    Choi, Won Seok
    Jeong, Jang Hyeon
    Choi, Seong Gon
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1678 - 1681
  • [26] Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation
    bin Sulaiman, Norshazrul Azman
    Masuda, Hideo
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (02) : 99 - 108
  • [27] MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks
    Yang Xiao
    Hsiao-Hwa Chen
    Bo Sun
    Ruhai Wang
    Sakshi Sethi
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [28] Research on Network Security Based on IPSec
    Liu, Yanru
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 150 - 154
  • [29] IPSec based bluetooth security architecture
    Al-Hawamdeh, Al-Muthanna
    Khan, Adil
    Sikander Hayat Khiyal, M.
    Information Technology Journal, 2007, 6 (04) : 478 - 489
  • [30] MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
    Xiao, Yang
    Chen, Hsiao-Hwa
    Sun, Bo
    Wang, Ruhai
    Sethi, Sakshi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)