Empirical Network Performance Evaluation of Security Protocols on Operating Systems

Автор: Shaneel Narayan, Michael Fitzgerald

Журнал: International Journal of Wireless and Microwave Technologies(IJWMT) @ijwmt

Статья в выпуске: 5 Vol.2, 2012 года.

Бесплатный доступ

Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice of the operating systems and cryptographic algorithms is critical to enhancing network performance. In this research undertaking, three VPN techniques, namely DES, 3DES and AES, which are commonly used to implement IPSec VPNs, are performance analyzed on test-bed setup. These are implemented on a network with Linux Fedora and a router and Windows desktop operating systems on another node. The VPN algorithms tested show that there may be performance differences when implemented with different operating system combinations.

Еще

VPN, AES, 3DES, DES, Windows 7, Windows Vista, Windows XP, Linux Fedora, Network Performance

Короткий адрес: https://sciup.org/15012827

IDR: 15012827

Список литературы Empirical Network Performance Evaluation of Security Protocols on Operating Systems

  • S. Narayan, M. Fitzgerald, and S. Ram, “Empirical Network Performance Evalaution of IPSec Algorithms on Windows Operating Systems Implemented on a Test-bed”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 2010.
  • S. Narayan, S. S. Kolahi, K. Brooking, and S. de Vere, “ Performance Evaluation of Virtual Private Networks in Windows 2003 Environment”, IEEE International Conference on Advanced Computer Theory and Engineering (ICACTE), December 2008.
  • A. A. Joha, F. B. Shatwan, and M. Ashibani, “Performance Evaluation for Remote Access VPN on Windows Server 2003 and Fedora Core 6”, IEEE 8th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS), Serbia, pp. 587-592, September 2007.
  • T. Berger, “Analysis of Current VPN Technologies”, The First IEEE International Conference on Availability, Reliability and Security (ARES), April 2006.
  • A. Nadeem and M. Y. Javed, “A Performance Comparison of Data Encryption Algorithms”, IEEE First International Conference on Information and Communication Technologies (ICICT), pp. 84-89, August 2005.
  • S. Khanvikar and A. Khokhar, “Experimental evaluations of Open-Source Linux-based VPN solutions”, IEEE 13th International Conference on Computer Communications and Networks (ICCCN), pp. 181-186, October 2004.
  • S. Khanvikar and A. Khokhar, “Virtual Private Networks: An Overview with Performance Evaluation”, IEEE Communications Magazine, vol. 42, issue 10, pp. 146-154, October 2004.
  • J. Lin, C. Chang, and W. Chung, “Design, Implementation and Performance Evaluation of IP-VPN”, IEEE 17th International Conference on Advanced Information Networking and Applications, pp. 206-209, March 2003.
  • S. Al-Khayatt, S. A. Shaikh, B. Akhbar, and J. Siddiqi, “A Study of Encrypted, Tunneling Models in Virtual Private Networks”, IEEE International Conference on Information Technology: Coding and Computing, pp. 139-143, April 2002.
  • C. J. C. Pena and J. Evans, “Performance Evaluation of Software Virtual Private Networks (VPN)”, 25th Annual IEEE Conference on Local Computer Networks (LCN), pp. 522-523, November 2000.
  • J. P. McGregor and R. B. Lee, “Performance Impact of Data Compression on Virtual Private Network Transactions”, 25th Annual IEEE Conference on Local Computer Networks (LCN), pp. 500-510, November 2000.
  • Botta, A Dainotti, A Pescapè, "Multi-protocol and multi-platform traffic generation and measurement", INFOCOM 2007 DEMO Session, May 2007, Anchorage (Alaska, USA).
Еще
Статья научная