Abstract
TCP/IP protocol suite is used to transfer the information among various networks/users located at remote sites. The transfer of information can be subjected to a lot of vulnerabilities, which can be overcome by providing authentication, confidentiality, integrity, etc. The TCP/IP has been implemented with IPSec to provide protection to packets that are transferred through internet. This paper discusses various protocols used for the protection from attacks by providing authentication check and confidentiality to data. The comparison has been made to identify the best suitable protocol and techniques used for the improvement in the performance of IPSec. This paper discusses various issues encountered when new techniques are implemented to enhance IPSec performance. The security flaws in the algorithms have also been summarized. VPN is also an example which describes the best suitable use of IPSec. This paper explores the VPN and various vulnerabilities present in it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“Cryptographic algorithm for ESP & AH”, RFC 4305 (2005).
Angelos D. Keromytis: A comprehensive survey of voice over IP security research, IEEE communication survey and tutorials (2012).
Craig A. Shue, and Steven A. Myers: IPSec: performance analysis and enhancements (2007).
Y.P. Kosta, Upena D. Dalal and Rakesh Kumar Jha: Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN), International Conference on Recent Trends in Information, Telecommunication and Computing (2010).
Joseph D. Touch, Yi-Hua Edward Yang: Reducing the impact of DoS attacks on endpoint IP security, IEEE (2006).
Joel Singh, and Ben Soh: A critical analysis of multilayer IP security protocol, IEEE ICITA (2005).
Yongguang Zhang: A Multilayer IP security protocol for TCP performance enhancement in wireless networks, IEEE journal on selected areas in communication, VOL. 22, NO. 4 (2004).
Nadim Assaf, Jijun Luo, Markus Dillinger, and Luis Menendez: Interworking between IP security and performance enhancing proxies for mobile networks, IEEE communication magazine (2002).
Madalina Baltatu, Antonio Lioy, Fabio Maino, and Daniele Mazzocchi: Security issues in control, management and routing protocols (2000).
Nadia Issa, and Chris Todd: IPSec implementation for a better security in IEEE 802.11 WLANs.
Radia Perlman, and Charlie Kaufman: Key exchange in IPSec, IEEE (2000).
Byeong-Ho Kang, and Maricel O. Balitanas: Vulnerabilities of VPN using IPSec and defensive measures, International journal of advanced science and technology (2009).
Thomas Berger: Analysis of current VPN Technologies, IEEE ARES (2006).
Sierra J.M., Hernindez J.C., Ribagorda A., and Jayaram N.: Migration of internet security protocols to the IPSec framework, IEEE (2002).
Bhavya Daya: Network security: history, importance, and future.
Kenneth G. Paterson, and Arnold K.L. Yau: Cryptography in theory and practice: The Case of Encryption in IPSec (2005).
Mei Song and Zhang Yun-he: One New Research About IPSec Communication Based on HTTP Tunnel (2009).
Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, and Sanglu Lu: A Timing-Based Scheme for Rogue AP Detection, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11 (2011).
Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 2 (2006).
Chao Yang, Yimin Song, and Guofei Gu: Active User-Side Twin Access Point detection Using Statistical Techniques, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Garima Chopra, Jha, R.K., Farida Lone (2017). A Survey on Wireless Security: IP Security Concern. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_70
Download citation
DOI: https://doi.org/10.1007/978-981-10-1675-2_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1674-5
Online ISBN: 978-981-10-1675-2
eBook Packages: EngineeringEngineering (R0)