Full Paper View Go Back

IPSEC: Analysis of Internet Protocol Security

Kasamsetty Kedarnath1

Section:Technical Paper, Product Type: Journal
Vol.1 , Issue.3 , pp.1-8, Jul-2013

Online published on Sep 02, 2013


Copyright © Kasamsetty Kedarnath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kasamsetty Kedarnath, “IPSEC: Analysis of Internet Protocol Security,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.3, pp.1-8, 2013.

MLA Style Citation: Kasamsetty Kedarnath "IPSEC: Analysis of Internet Protocol Security." International Journal of Scientific Research in Network Security and Communication 1.3 (2013): 1-8.

APA Style Citation: Kasamsetty Kedarnath, (2013). IPSEC: Analysis of Internet Protocol Security. International Journal of Scientific Research in Network Security and Communication, 1(3), 1-8.

BibTex Style Citation:
@article{Kedarnath_2013,
author = {Kasamsetty Kedarnath},
title = {IPSEC: Analysis of Internet Protocol Security},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {7 2013},
volume = {1},
Issue = {3},
month = {7},
year = {2013},
issn = {2347-2693},
pages = {1-8},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=70},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=70
TI - IPSEC: Analysis of Internet Protocol Security
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Kasamsetty Kedarnath
PY - 2013
DA - 2013/09/02
PB - IJCSE, Indore, INDIA
SP - 1-8
IS - 3
VL - 1
SN - 2347-2693
ER -

4634 Views    4432 Downloads    4324 Downloads
  
  

Abstract :
IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Key-Words / Index Term :
IPSEC, ISAKMP, Protocols, DES

References :
[1] Using IPSEC to Construct Virtual Private Networks, IBM, 1998.
[2] H. Orman, The Oakley Key Determination Protocol, RFC 2412, Nov. 1998.
[3] S. Kent and R Atkinson, Security Architecture for the Internet Protocol, RFC 2401, Nov. 1998.
[4] S. Kent and R Atkinson, IP Authentication Header, RFC 2402, Nov. 1998.
[5] D. Maughan, M. Schertler, M. Schneider, and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408, Nov. 1998.
[6] The Internet IP Security Domain of Interpretation for ISAKMP.
[7] C. Madson and R Glenn, The Use of HMAC-MD5-96 within ESP and AH, RFC 2403, Nov. 1998.
[8] C. Madson and R Glenn, The Use of HMAC-SHA-1-96 within ESP and AH, RFC 2404, Nov. 1998.
[9] S. Kent and R Atkinson, IP Encapsulating Security Payload (ESP), RFC 2406, Nov. 1998.
[10] C. Madson and N. Doraswamy, The ESP DES-CBC Cipher Algorithm With Explicit IV, RFC 2405, Nov. 1998.
[11] R Periera and R Adams, The ESP CBC-Mode Cipher Algorithms, RFC 2451, Nov. 1998.
[12] Jong-Hyeon Lee, A Survey on IPSEC Key Management Protocols, Computer Laboratory, University of Cambridge, United Kingdom, Dec. 1996.
[13] R Thayer, N. Doraswamy, and R Glenn, IP Security Document Roadmap, RFC 2411, Nov. 1998.
[14] Steven M. Bellovin, “Problem Areas for the IP Security Protocols,” The 6th VSENIX UNIX Security Symp., San Jose, California, USA, July 1996.
[15] http://www.ietf.org/html.charters/ipsec-charter.html.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation