Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 673))

Abstract

This paper presents an overview of the Internet Protocol Security (IPSec) protocol [13, 14] implemented in a Dynamic Multipoint Virtual Private Network (DMVPN) to implement security features at the network layer to provide authenticated and confidential communication using various authentication and encryption protocols operating between devices located at a far away distance from one another on the Internet. In order to provide secure communication between various branches of a company located at distant locations across the Internet and to protect the data from unauthorized access, we create a virtual tunnel connecting the branches and send data across the branches in encrypted packets encapsulated within Internet Protocol (IP) datagram which are hidden from the Internet. The packets pass across to the other branch as if they are in one private network which overlays the Internet. We use the IPSec protocol for providing authentication and encryption to the IP packets. We create a Generic Routing Encapsulation (GRE) tunnel to create a DMVPN connecting the branch offices to one another. We have used GNS3 for the simulation of the scenario which is an emulator software for routers, computers, switches and various other network devices. With the help of GNS3, we were able to access the configuration terminal of various network devices and configure appropriate commands for implementing the DMVPN solution. We also used Wireshark which is a packet analyzer software that is used for tracking the IP packets which pass through the network and analyze their header, protocol information and the data that is encapsulated within it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Deshmukh D, Iyer B (2017) Design of IPSec virtual private network for remote access. In: 2017 international conference on computing, communication and automation, Greater Noida, 5–6 May 2017

    Google Scholar 

  2. Zhang Y, Singh B (2000, August 14–17) A multi-layer IPSec protocol. In: USENIX security symposium, California, USA, pp 213–228

    Google Scholar 

  3. Elkeelany O, Matalgah MM, Sheikh KP (2002) Performance analysis of IPSec protocol encryption and authentication. In: IEEE international conference on communications, New York, USA, 1–2 May, pp 1164–1168

    Google Scholar 

  4. Dhall H, Dhall D, Batra S, Rani P (2012) Implementation of IPSec protocol. In: 2nd international conference on advanced computing and communication technologies, Rohtak, Haryana, India, 7–8 January 2012

    Google Scholar 

  5. Zhang Y (2004) A multilayer IP security protocol for TCP performance enhancement in wireless networks. IEEE J Sel Areas Commun 22(4):767–776

    Google Scholar 

  6. Pearlman R, Kaufman C (2001) Analysis of the IPSec key exchange standard. In: Tenth IEEE international workshop on enabling technologies, Cambridge, USA, 20–22 June 2001

    Google Scholar 

  7. Nozaki H, Motoyama M, Shimbo A (2001) Implementation of RSA algorithm based on RNS Montgomery multiplication. In: International workshop on cryptographic hardware and embedded systems, Paris, France, 14–16 May 2001, pp 364–376

    Google Scholar 

  8. Kocher PC (2001) Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In: Annual international cryptography conference, San Francisco, USA, 13 July 2001, pp 104–113

    Google Scholar 

  9. Joux A (2000) A one round protocol for tripartite Diffie-Hellman. In: International algorithmic number theory symposium, Netherlands, 2–7 July 2000, , pp 385–393

    Google Scholar 

  10. Yang B, Wu K, Karri R (2004) Scan based side channel attack on dedicated hardware implementations of data encryption standard. ITC, Washington DC, USA, 26–28 October 2004, pp 339–344

    Google Scholar 

  11. Khan E, El-Kharashi MW, Gebali F (2007, December 12) Design and performance analysis of a unified, reconfigurable HMAC hash unit. IEEE Trans Circ Syst 2683–2695

    Google Scholar 

  12. Chkliaev D, Hooman J, de Vink E (2003, February 28) verification and improvement of the sliding window protocol. In: International conference on tools and algorithms for the construction and analysis of systems, pp 113–127

    Google Scholar 

  13. Al-Khatib AA (2018, September) Impact of IPSec protocol on the performance of network real-time applications. Int J Netw Secur 811–819

    Google Scholar 

  14. Alshamsi A, Saito T (2005) A technical comparision of IPSec and SSL. In: 19th international conference on advanced information networking and applications, Taiwan, 28–30 March 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rishikesh Raj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, J., Kumar, M., Pandey, D.K., Raj, R. (2021). Encryption and Authentication of Data Using the IPSEC Protocol. In: Nath, V., Mandal, J.K. (eds) Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems. Lecture Notes in Electrical Engineering, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-15-5546-6_71

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5546-6_71

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5545-9

  • Online ISBN: 978-981-15-5546-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics