ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Insight into Virtual Private Networks & IP Tunneling

Journal: International Journal of Engineering and Techniques (Vol.3, No. 4)

Publication Date:

Authors : ;

Page : 129-133

Keywords : ---;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Virtual Private Network used to create an end-to-end tunnel over third-party networks such as the Internet or extranets. It cannot guarantee that the information remains secure while traversing the tunnel. There are many different types of VPN technologies available such as Internet Protocol Security, SSL, MPLS, L2F, PPTP, L2TP and GRE. IPSec has become a much more popular VPN security. A Virtual private network possesses all the features of the private network and is built on existing network, but they suffer severe security problems, particularly authentication problem. AVirtual private network possesses all the features of the private network and is built on existing network, but they suffer severe security problems, particularly authentication problem. This paper introduces a authenticated key agreement protocol based on certificateless cryptography to authenticate users to establish a secure session between them.

Last modified: 2018-05-19 18:22:44