Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 468))

Abstract

TCP/IP protocol suite is used to transfer the information among various networks/users located at remote sites. The transfer of information can be subjected to a lot of vulnerabilities, which can be overcome by providing authentication, confidentiality, integrity, etc. The TCP/IP has been implemented with IPSec to provide protection to packets that are transferred through internet. This paper discusses various protocols used for the protection from attacks by providing authentication check and confidentiality to data. The comparison has been made to identify the best suitable protocol and techniques used for the improvement in the performance of IPSec. This paper discusses various issues encountered when new techniques are implemented to enhance IPSec performance. The security flaws in the algorithms have also been summarized. VPN is also an example which describes the best suitable use of IPSec. This paper explores the VPN and various vulnerabilities present in it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “Cryptographic algorithm for ESP & AH”, RFC 4305 (2005).

    Google Scholar 

  2. Angelos D. Keromytis: A comprehensive survey of voice over IP security research, IEEE communication survey and tutorials (2012).

    Google Scholar 

  3. Craig A. Shue, and Steven A. Myers: IPSec: performance analysis and enhancements (2007).

    Google Scholar 

  4. Y.P. Kosta, Upena D. Dalal and Rakesh Kumar Jha: Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN), International Conference on Recent Trends in Information, Telecommunication and Computing (2010).

    Google Scholar 

  5. Joseph D. Touch, Yi-Hua Edward Yang: Reducing the impact of DoS attacks on endpoint IP security, IEEE (2006).

    Google Scholar 

  6. Joel Singh, and Ben Soh: A critical analysis of multilayer IP security protocol, IEEE ICITA (2005).

    Google Scholar 

  7. Yongguang Zhang: A Multilayer IP security protocol for TCP performance enhancement in wireless networks, IEEE journal on selected areas in communication, VOL. 22, NO. 4 (2004).

    Google Scholar 

  8. Nadim Assaf, Jijun Luo, Markus Dillinger, and Luis Menendez: Interworking between IP security and performance enhancing proxies for mobile networks, IEEE communication magazine (2002).

    Google Scholar 

  9. Madalina Baltatu, Antonio Lioy, Fabio Maino, and Daniele Mazzocchi: Security issues in control, management and routing protocols (2000).

    Google Scholar 

  10. Nadia Issa, and Chris Todd: IPSec implementation for a better security in IEEE 802.11 WLANs.

    Google Scholar 

  11. Radia Perlman, and Charlie Kaufman: Key exchange in IPSec, IEEE (2000).

    Google Scholar 

  12. Byeong-Ho Kang, and Maricel O. Balitanas: Vulnerabilities of VPN using IPSec and defensive measures, International journal of advanced science and technology (2009).

    Google Scholar 

  13. Thomas Berger: Analysis of current VPN Technologies, IEEE ARES (2006).

    Google Scholar 

  14. Sierra J.M., Hernindez J.C., Ribagorda A., and Jayaram N.: Migration of internet security protocols to the IPSec framework, IEEE (2002).

    Google Scholar 

  15. Bhavya Daya: Network security: history, importance, and future.

    Google Scholar 

  16. Kenneth G. Paterson, and Arnold K.L. Yau: Cryptography in theory and practice: The Case of Encryption in IPSec (2005).

    Google Scholar 

  17. Mei Song and Zhang Yun-he: One New Research About IPSec Communication Based on HTTP Tunnel (2009).

    Google Scholar 

  18. Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, and Sanglu Lu: A Timing-Based Scheme for Rogue AP Detection, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11 (2011).

    Google Scholar 

  19. Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 2 (2006).

    Google Scholar 

  20. Chao Yang, Yimin Song, and Guofei Gu: Active User-Side Twin Access Point detection Using Statistical Techniques, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Chopra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Garima Chopra, Jha, R.K., Farida Lone (2017). A Survey on Wireless Security: IP Security Concern. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1675-2_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1674-5

  • Online ISBN: 978-981-10-1675-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics