Abstract
This paper presents an overview of the Internet Protocol Security (IPSec) protocol [13, 14] implemented in a Dynamic Multipoint Virtual Private Network (DMVPN) to implement security features at the network layer to provide authenticated and confidential communication using various authentication and encryption protocols operating between devices located at a far away distance from one another on the Internet. In order to provide secure communication between various branches of a company located at distant locations across the Internet and to protect the data from unauthorized access, we create a virtual tunnel connecting the branches and send data across the branches in encrypted packets encapsulated within Internet Protocol (IP) datagram which are hidden from the Internet. The packets pass across to the other branch as if they are in one private network which overlays the Internet. We use the IPSec protocol for providing authentication and encryption to the IP packets. We create a Generic Routing Encapsulation (GRE) tunnel to create a DMVPN connecting the branch offices to one another. We have used GNS3 for the simulation of the scenario which is an emulator software for routers, computers, switches and various other network devices. With the help of GNS3, we were able to access the configuration terminal of various network devices and configure appropriate commands for implementing the DMVPN solution. We also used Wireshark which is a packet analyzer software that is used for tracking the IP packets which pass through the network and analyze their header, protocol information and the data that is encapsulated within it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Deshmukh D, Iyer B (2017) Design of IPSec virtual private network for remote access. In: 2017 international conference on computing, communication and automation, Greater Noida, 5–6 May 2017
Zhang Y, Singh B (2000, August 14–17) A multi-layer IPSec protocol. In: USENIX security symposium, California, USA, pp 213–228
Elkeelany O, Matalgah MM, Sheikh KP (2002) Performance analysis of IPSec protocol encryption and authentication. In: IEEE international conference on communications, New York, USA, 1–2 May, pp 1164–1168
Dhall H, Dhall D, Batra S, Rani P (2012) Implementation of IPSec protocol. In: 2nd international conference on advanced computing and communication technologies, Rohtak, Haryana, India, 7–8 January 2012
Zhang Y (2004) A multilayer IP security protocol for TCP performance enhancement in wireless networks. IEEE J Sel Areas Commun 22(4):767–776
Pearlman R, Kaufman C (2001) Analysis of the IPSec key exchange standard. In: Tenth IEEE international workshop on enabling technologies, Cambridge, USA, 20–22 June 2001
Nozaki H, Motoyama M, Shimbo A (2001) Implementation of RSA algorithm based on RNS Montgomery multiplication. In: International workshop on cryptographic hardware and embedded systems, Paris, France, 14–16 May 2001, pp 364–376
Kocher PC (2001) Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In: Annual international cryptography conference, San Francisco, USA, 13 July 2001, pp 104–113
Joux A (2000) A one round protocol for tripartite Diffie-Hellman. In: International algorithmic number theory symposium, Netherlands, 2–7 July 2000, , pp 385–393
Yang B, Wu K, Karri R (2004) Scan based side channel attack on dedicated hardware implementations of data encryption standard. ITC, Washington DC, USA, 26–28 October 2004, pp 339–344
Khan E, El-Kharashi MW, Gebali F (2007, December 12) Design and performance analysis of a unified, reconfigurable HMAC hash unit. IEEE Trans Circ Syst 2683–2695
Chkliaev D, Hooman J, de Vink E (2003, February 28) verification and improvement of the sliding window protocol. In: International conference on tools and algorithms for the construction and analysis of systems, pp 113–127
Al-Khatib AA (2018, September) Impact of IPSec protocol on the performance of network real-time applications. Int J Netw Secur 811–819
Alshamsi A, Saito T (2005) A technical comparision of IPSec and SSL. In: 19th international conference on advanced information networking and applications, Taiwan, 28–30 March 2005
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, J., Kumar, M., Pandey, D.K., Raj, R. (2021). Encryption and Authentication of Data Using the IPSEC Protocol. In: Nath, V., Mandal, J.K. (eds) Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems. Lecture Notes in Electrical Engineering, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-15-5546-6_71
Download citation
DOI: https://doi.org/10.1007/978-981-15-5546-6_71
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5545-9
Online ISBN: 978-981-15-5546-6
eBook Packages: EngineeringEngineering (R0)