Overhead Analysis of Security Implementation Using IPSec

被引:0
|
作者
Azam, Muhammad Awais [1 ,2 ]
Zaka-Ul-Mustafa [3 ]
Tahir, Usman [2 ]
Ahsan, S. M. [2 ]
Naseem, Muhammad Adnan [2 ]
Rashid, Imran [2 ]
Adeel, Muhammad [1 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
[2] Univ Engn & Technol, Taxila, Pakistan
[3] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Authentication, access Control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true cost of security to be accurately measured. This research work measures the overheads involved in implementation of security using IPSec in different wired/wireless data network protocols.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [31] IPSec overhead in wireline and wireless networks for web and email applications
    Hadjichristofi, GC
    Davis, NJ
    Midkiff, SF
    2003 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE PROCEEDINGS, 2003, : 543 - 547
  • [32] Implementation of IPsec VPN with SIP Softphones using GNS3
    Sushma, Amirisetti
    Sanguankotchakorn, Teerapat
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 152 - 156
  • [33] Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation
    bin Sulaiman, Norshazrul Azman
    Masuda, Hideo
    2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), 2014, : 687 - 693
  • [34] The implementation of IPSec application using IXP2850 network processor
    Han, Minho
    Kim, Kiyoung
    Jang, Jongsoo
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 92 - 97
  • [35] Analysis and implementation of custom cipher algorithm for IPsec under Linux OS
    Veinovic, Mladen
    Jevremovic, Aleksandar
    Simic, Goran
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 80 - 86
  • [36] Analysis for Security Implementation in SDLC
    Raj, Gaurav
    Singh, Dheerendra
    Bansal, Abhay
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 221 - 226
  • [37] Efficient Hardware Checkpointing - Concepts, Overhead Analysis, and Implementation
    Koch, Dirk
    Haubelt, Christian
    Teich, Juergen
    FPGA 2007: FIFTEENTH ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS, 2007, : 188 - 196
  • [38] Efficient Security Associations Establishment Using IPSec in IMS after Handover in NGMN
    Tahira, Shireen
    Ullah, Ata
    Ashraf, Humaira
    Sher, Muhammad
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (02): : 359 - 367
  • [39] Traffic masking in IPsec: architecture and implementation
    Kiraly, Csaba
    Bianchi, Giuseppe
    Formisano, Fabrizio
    Teofili, Simone
    Lo Cigno, Renato
    2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 1343 - +
  • [40] Implementation of IPSec in High Performance router
    Gu Xiao-zhuo
    Yang Jian-zu
    Lan Ju-long
    2006 6th International Conference on ITS Telecommunications Proceedings, 2006, : 1057 - 1060