Skip to main content

Secured Communication Using Virtual Private Network (VPN)

  • Conference paper
  • First Online:
Cyber Security and Digital Forensics

Abstract

The evolution and era of the latest programs and services, collectively with the enlargement of encrypted communications, make it difficult for site visitors within a safety enterprise. Virtual private networks (VPNs) are an instance of encrypted communique provider that is becoming famous, as a way for bypassing censorship in addition to gaining access to offerings which are geographically locked. This paper reviews the layout of an IP security, VPN. The Cisco Packet lines platform is used for the simulation, evaluation and verification. It uses a virtual connection to carry the records packets from a non-public network to remote places.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Odusami, M., Misra, S., Adetiba, E., Abayomi-Alli, O., Damasevicius, R., Ahuja, R.: An improved model for alleviating layer seven distributed denial of service intrusion on webserver. J. Phys.: Conf. Ser. 1235(1), 012020 (2019)

    Google Scholar 

  2. Odusami, M., Misra, S., Abayomi‐Alli, O., Abayomi‐Alli, A., Fernandez‐Sanz, L.:. A survey and meta‐analysis of application‐layer distributed denial‐of‐service attack. Int. J. Commun. Syst. 33(18), e4603 (2020)

    Google Scholar 

  3. Draper-gil, G., Lashkari, A.H., Saiful, M., Mamun, I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security And Privacy (ICISSP), pp. 407–414, 2016

    Google Scholar 

  4. Busschbach, P.B.: ♦ Toward QoS-capable virtual private networks. Bell Labs Tech. J. 3(4), 161–175 (1998)

    Article  Google Scholar 

  5. Deshmukh, D., Iyer, B.: Design of IPSec virtual private network for remote access. In: 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 716–719. IEEE, 2017

    Google Scholar 

  6. Nawej, M.C., Technologiae, M.: Evaluation of virtual private network impact on network performance (2016)

    Google Scholar 

  7. Liyanage, M., Gurtov, A.: Secured VPN models for LTE backhaul networks. In: 2012 IEEE Vehicular Technology Conference (VTC Fall), Sept 2015, pp. 1–5. IEEE

    Google Scholar 

  8. Jaha, A.A., Ben Shatwan, F., Ashibani, M.: Proper virtual private network (VPN) solution. In: Proceedings of 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies, NGMAST 2008, pp. 309–314, 2008

    Google Scholar 

  9. Azhar, M.A., Saudi, M.M., Ahmad, A., Bakar, A.A.: Detection of social media exploitation via SMS and Camera. IJIM 13(4), 61–78 (2019). Last accessed 01 Mar 21. https://www.learntechlib.org/p/208525/paper_208525.pdf

  10. Chze, P.L.R., Leong, K.S.: A secure multi-hop routing for IoT communication. In: 2014 IEEE World Forum on Internet of Things, WF-IoT 2014

    Google Scholar 

  11. Das, A., Islam, M.M.: SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. 9(2), (2012)

    Google Scholar 

  12. Sarika, S., Pravin, A., Vijayakumar, A., Selvamani, K.: Security issues in mobile ad hoc networks. Proc. Comput. Sci. 3(5), 1022–1024 (2014)

    Google Scholar 

  13. Wu, B., Chen, J., Wu, J., Cardei, M.: COUNTERMEASURES IN

    Google Scholar 

  14. Dinesh, D., Kumar, A., Singh, J.: Security attacks in mobile adhoc networks (MANET): a literature survey. Int. J. Comput. Appl. 122(20), 31–35 (2015)

    Google Scholar 

  15. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)

    Article  Google Scholar 

  16. Manvi, S.S., Tangade, S.: A survey on authentication schemes in VANETs for secured communication. Veh. Commun. (2017)

    Google Scholar 

  17. Assadhan, B., Moura, J.M.F., Lapsley, D., Jones, C., Strayer, W.T.: Detecting botnets using command and control traffic, 4, 156–162 (2009)

    Google Scholar 

  18. Lan, J., Zhou, J., Liu, X.: An area-efficient implementation of a message authentication code (MAC) algorithm for cryptographic systems. In: IEEE Reg. 10 Annual International Conference Proceedings/TENCON, pp. 1977–1979, 2017

    Google Scholar 

  19. Liu, Z., Lallie, H.S., Liu, L., Zhan, Y., Wu, K.: A hash-based secure interface on plain connection, 1236–1239 (2011)

    Google Scholar 

  20. Padmavathi, G., Subashini, P., Aruna, M.D.D.: ZRP with WTLS key management technique to secure transport and network layers in mobile adhoc networks. Int. J. Wirel. Mob. Netw. 4(1), 129–138 (2012)

    Google Scholar 

  21. Liang, Y., Poor, H.V., Shamai, S.: Secure communication over fading channels. IEEE Trans. Inf. Theory 54(6), 2470–2492 (2008)

    Article  MathSciNet  Google Scholar 

  22. Kobayashi, M., Shitz, S.S.: Secured communication over frequency-selective fading channels : a practical vandermonde precoding, 2009 (2009)

    Google Scholar 

  23. Azeez, N.A., Salaudeen, B.B., Misra, S., Damaševičius, R., Maskeliūnas, R.: Identifying phishing attacks in communication networks using URL consistency features. Int. J. Electron. Secur. Digit. Forensics 12(2), 200–213 (2020)

    Article  Google Scholar 

  24. Osho, O., Musa, F.A., Misra, S., Uduimoh, A.A., Adewunmi, A., Ahuja, R.: AbsoluteSecure: a tri-layered data security system. Commun. Comput. Inf. Sci. 1078, 243–255

    Google Scholar 

Download references

Acknowledgements

The authors appreciate the sponsorship from Covenant University through its Center for Research, Innovation and Discovery, Covenant University, Ota Nigeria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Misra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ezra, P.J., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R., Damasevicius, R. (2022). Secured Communication Using Virtual Private Network (VPN). In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds) Cyber Security and Digital Forensics . Lecture Notes on Data Engineering and Communications Technologies, vol 73. Springer, Singapore. https://doi.org/10.1007/978-981-16-3961-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3961-6_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3960-9

  • Online ISBN: 978-981-16-3961-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics