Overhead Analysis of Security Implementation Using IPSec

被引:0
|
作者
Azam, Muhammad Awais [1 ,2 ]
Zaka-Ul-Mustafa [3 ]
Tahir, Usman [2 ]
Ahsan, S. M. [2 ]
Naseem, Muhammad Adnan [2 ]
Rashid, Imran [2 ]
Adeel, Muhammad [1 ]
机构
[1] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
[2] Univ Engn & Technol, Taxila, Pakistan
[3] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Authentication, access Control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true cost of security to be accurately measured. This research work measures the overheads involved in implementation of security using IPSec in different wired/wireless data network protocols.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [41] The Implementation of IKEV2 for IPSec
    Yang, Xiaojin
    Liu, Jianhua
    CLOUD COMPUTING (CLOUDCOMP 2014), 2015, 142 : 175 - 180
  • [42] Performance Analysis of Internet Key Exchange Algorithms on IPSec Security Association Initiation
    Praptodiyono, Supriyanto
    Furqon, Moh
    Maulana, Alief
    Hasbullah, Iznan H.
    Rehman, Shafiq Ul
    1ST INTERNATIONAL CONFERENCE ON INDUSTRIAL, ELECTRICAL AND ELECTRONICS (ICIEE 2018), 2018, 218
  • [43] IPSec overhead analysis in dual stack IPv4/IPv6 transition mechanisms
    Mujinga, A
    Muyingi, H
    Rao, GSVRK
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U686 - U691
  • [44] Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator
    Kurniawan, Dwi Ely
    Arif, Hamdani
    Nelmiawati, N.
    Tohari, Ahmad Hamim
    Fani, Maidel
    1ST INTERNATIONAL CONFERENCE ON ADVANCE AND SCIENTIFIC INNOVATION, 2019, 1175
  • [45] Low Overhead Security Isolation using Lightweight Kernels and TEEs
    Lange, John R.
    Gordon, Nicholas
    Gaines, Brian
    SCWS 2021: 2021 SC WORKSHOPS SUPPLEMENTARY PROCEEDINGS, 2021, : 42 - 49
  • [46] Security Overhead on a Service with Automatic Resource Management: A Performance Analysis
    Batista, Bruno Guazzelli
    Kuehne, Bruno Tardiole
    Leite Filho, Dionisio Machado
    Maciel Peixoto, Maycon Leone
    COMPUTER JOURNAL, 2019, 62 (02): : 161 - 173
  • [47] Techniques for improving the security and manageability of IPsec policy
    Trostle J.
    Gossman B.
    International Journal of Information Security, 2005, 4 (3) : 209 - 226
  • [48] IPsec/VPN security policy correctness and assurance
    Yang, Yanyan
    Martel, Charles U.
    Fu, Zhi
    Wu, Shyhtsun Felix
    JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (03) : 275 - 289
  • [49] A Security Solution Based on IPSec for Smart Substation
    Dang, Nan
    Zhao, Pengjun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 173 - 177
  • [50] Migration of Internet security protocols to the IPSEC framework
    Sierra, JM
    Hernández, JC
    Ribagorda, A
    Jayaram, N
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 134 - 143