Revision on Virtual Private Network (VPN) Protocols and Security

Authors

DOI:

https://doi.org/10.33193/JICIS.1.1.2021.26

Keywords:

VPN, Network, Protocols, Encryption, WAN, cost, QoS,

Abstract

When an access-desired network is constructed using public network infrastructure such as global Internet to connect remote users or regional offices to company's private network is said to be Virtual Private Network(VPN). A VPN protects the private network, using encryption and other security mechanisms to confirm that only authorized users can access the system and the data can be intercepted. This Literature review paper explains about Virtual Private Network(VPN), It's protocols and Security in VPN.

References

Dr.Gray, -Virtual Private Network‖, IS 311, Tuesday 7pm, November 19, 2002.

Benjamin Odiyo, Mukunda Dwarkanath, Virtual Private Network, 2007.

A.Venkateswari et al, -COMPARATIVE STUDY OF PROTOCOS USED IN VPN‖. International Journal of Engineering science and Technology, Vol1 (3), 2009.

H. Bourdoucen, A. Al Naamany and A. Al Kalbani -Impact of Implementing VPN to Secure Wireless LAN‖, World Academy of Science, Engineering and Technology 27 2009.

MohdNazri Ismail -Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance‖, INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY SCIENCES AND ENGINEERING, VOL. 1, NO. 2, NOVEMBER 2010.

Kotuliak, P.Rybár and P.Trúchly, -Performance Comparison of IPsec and TLS Based VPN Technologies‖,ICETA 2011 • 9th IEEE International Conference on Emerging eLearning Technologies and Applications • StaráLesná, The High Tatras, Slovakia, October 27-28, 2011.

Luca Cittadini Giuseppe Di Battista Maurizio Patrignani, L. Cittadini, G. Di Battista, M. Patrignani,, -MPLS Virtual Private Networks‖, Advances in Networking, (2013

El bachir El achhab, -On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids‖, Network Protocols and Algorithms Vol. 6, No. 3, 2014.

M. Judith Bellar, -Cloud Computing Security with VPN‖, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, August 2015.

Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 and Alessandro Mei2, -A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients‖, Proceedings on Privacy Enhancing Technologies 2015.

Krithikaa, M. Priyadharsini and C.Subha, -Virtual Private Network -A Survey‖, IT Department, Sri Krishna Arts and Science College, Coimbatore, TamilNadu, India, IJTRD | Jan -Feb 2016

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, (2012). Exploration and evaluation of traditional TCP congestion control techniques. Journal of King Saud University - Computer and Information Sciences, 24(2), 145–155.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "A Survey on Performance of Congestion Control Mechanisms for Standard TCP Versions", Australian Journal of Basic and Applied Sciences, vol. 5, no. 12, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "The Evolution To 4g Cellular Systems: Architecture And Key Features Of LTE-Advanced Networks", spectrum, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Modeling and Performance Evaluation of LTE Networks with Different TCP Variants", International Scholarly and Scientific Research & Innovation 5(3), pp 443-448. (2011).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Behaviour of cwnd for Different TCP source Variants over Parameters of (LTE) Networks, " Information Technology Journal, ISSN: 1812-5638, Science Alert, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "A comparison and analysis of congestion window for HS-TCP Full-TCP and TCP-Linux in long term evolution system model", 2011 IEEE Conference on Open Systems, pp. 358-362, 2011.

Ghassan A. Abed, Mahamod Ismail, S. I. Badrawi and B. M. Sabbar, "An Empirical Model of Correlated Traffics in LTE-Advanced System through an Innovative Simulation Tool", International Journal of Electrical Robotics Electronics and Communications Engineering, 2013.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, “Traffic Modeling of LTE Mobile Broadband Network Based on NS-2 Simulator,” Computational Intelligence, Communication Systems and Networks (CICSyN), 2011 Third International Conference on,2011, pp. 120-125.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Characterization and observation of (transmission control protocol) TCP-vegas performance with different parameters over (long term evolution) LTE networks. Sci. Res. Essays 6, 2003–2010 (2011).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, “Distinguishing employment of stream control transmission protocol over LTE-Advanced networks,” Research Journal of Information Technology, vol. 3, no. 4, pp. 207–214, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Architecture And Functional Structure Of Transmission Control Protocol Over Various Networks Applications," Journal Of Theoretical And Applied Information Technology, Vol. 34, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Improvement of TCP Congestion Window over LTE-Advanced Networks", International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 4, pp. 185–192, June, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Appraisal of Long Term Evolution System with Diversified TCP's," in 5th Asia Modelling Symposium (AMS), may 2011, pp. 236-239.

Ghassan A. Abed, Mahamod Ismail and Kasmiran Jumari, A Realistic Model and Simulation Parameters of LTE-Advanced Networks, Selangor, pp. 2278-1021, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Influence of Parameters Variation of TCP-Vegas in Performance of Congestion window over Large Bandwidth-Delay Networks, 2011 17th Asia-Pacific Conference on Communicaions, 434-438, 2011.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Comparative Performance Investigation of TCP and SCTP Protocols over LTE/LTE-Advanced Systems", International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 6, pp. 466-471, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, Integrated approaches to enhance TCP performance over 4G wireless network. In: IEEE Symposium on Computers and Information, Penang, pp. 154–158 (2012).

Ghassan A. Abed, Queue size comparison for standard transmission control protocol variants over high-speed traffics in long term evolution advanced (LTE-A) network. Sci. Res. Essays – Acad. J. 9(23), 984–987 (2014).

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Experimented goodput measurement of standard TCP versions over large-bandwidth low-latency bottleneck", J. Comput., vol. 4, no. 5, pp. 212-216, 2012.

Ghassan A. Abed, Mahamod Ismail and Jumari Kasmiran, "Links Interfacing Demonstration of LTE-Advanced Networks Using NS-2 Modeller", Third International Conference on Intelligent Systems Modelling and Simulation (ISMS), February 2012.

Ghassan A. Abed and B. M. Sabbar, Significant role analysis of transmission control protocols in 4G cellular systems, International Journal of Computer and Information Engineering., Vol. 8, No. 5, pp. 920–923, 2014.

Ghassan A. Abed and L. Mustafa, Configuration and demonstration of relay-enhanced technique in LTE-Advanced systems, ICSES Journal on Computer Networks and Communications., Vol. 1, No. 1, pp. 10–13, 2015.

Ghassan A. Abed and Samir I. Badrawi, ‘Augmentation Opportunity of Transmission Control Protocol Performance in Wireless Networks and Cellular Systems,’ International Journal of Computer, Electrical, Automation, Control and Information Engineering vol.8, no.5, pp.915-919, 2014.

Ghassan A. Abed. "A New Approach to Improve Transmitting and Receiving Timing in Orthogonal Frequency Division Multiplexing (OFDM) Systems." Iraqi Journal For Computer Science and Mathematics 4.2 (2023): 83-96.

Ghassan A. Abed. "Assessment of Queuing in Typical TCP in 3GPP LTE/LTE-A Networks.

Ghassan A. Abed, and Sawsan N. Abdullah. "Estimation of Available Bandwidth for High Capacity Links Over Industrial Applications."

Published

2021-12-01

How to Cite

Reddy, I. (2021). Revision on Virtual Private Network (VPN) Protocols and Security. Journal of Information, Communication and Intelligence Systems, 1(1), 26–32. https://doi.org/10.33193/JICIS.1.1.2021.26

Issue

Section

Articles