• Title/Summary/Keyword: IPsec VPN

Search Result 93, Processing Time 0.025 seconds

Analyses of Crypto Module for Gbps VPN System

  • Kim, Jung-Tae;Han, Jong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.213-216
    • /
    • 2003
  • A VPN is widely used in a communications environment which access is controlled to permit peer connections only within a defined community of interest. It is constructed through some form of partitioning of a common underlying communication medium, where this underlying communications medium provides services to the network on a non-exclusive basis. In this paper, we have analyzed a variety of architecture to implement Giga bps VPN system. The proposed architecture will satisfy the needs of clients who adopt Giga bps VPN system in the various environments.

Issues and Security on IPSec: Survey (IPSec 보안 이슈와 대응 방안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.243-248
    • /
    • 2014
  • IPSec provides two services that are authentication header and Encapsulating Security Payload(ESP). In this research work, security issues on the Internet and the basic concept of IPSec are described. Security issues on the Internet are presented and proposed a possible solution for DDoS attack using IPSec. Therefore, this research will be able to contribute for building secure communication against DDoS attack.

Development of the Integrated Multimedia IP-PBX System (차세대 멀티미디어 음성보안 IP-PBX 시스템 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.95-100
    • /
    • 2011
  • The next generation IP-PBX system are demanding multimedia facility to carry out UC(Unified Communication) and voice security also. Therefore, in this paper, we have developed the integrated solution of IP-PBX for the voice security by adopting VPN IPsec based on SIP using tunnel method in transmitting voice data to prevent eavesdrop of voice data and have shared between communication system based on PC and PSTN terminals. In particular, We have developed a video conference, private switching, distributed processing and measured telephone conversation quality. This IP-PBX that is connected Soft-phone provide various optional services.

Secure Internet Phone Using IPSec (IPSec을 이용한 음성 보안 시스템)

  • 홍기훈;임범진;이상윤;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2001
  • An efficient encryption mechanism for transmitting voice packets on the Internet was proposed in this study. The VPN approach of encrypting all the packets through a gateway increases delay and delay jitter that may degrade the quality of service (QoS) in real-time communications. A user-controlled secure Internet phone, therefore. was designed and implemented. The secure phone enables the user to apply encryption to his own call when necessary, and reduces security overheads on the gateway.

On-Demand Tunnel Creation Mechanism in Star VPN Topology (성형 VPN 구조에서의 주문형 터널 생성 메커니즘)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.452-461
    • /
    • 2005
  • In the star VPN (Virtual Private Network) topology, the traffic between the communicating two CPE(Customer Premise Equipment) VPN GW(Gateway)s nay be inefficiently transferred. Also, the Center VPN GW nav erperience the overload due to excessive packet processing overhead. As a solution to this problem, a direct tunnel can be established between the communicating two CPE VPN GWs using the IKE (Internet Key Exchange) mechanism of IPSec(IP Security). In this case, however, the tunnel establishment and management nay be complicated. In this paper, we propose a mechanism called' SVOT (Star VPN On-demand Tunnel)', which automatically establishes a direct tunnel between the communicating CPE VPN GWs based on demand. In the SVOT scheme, CPE VPN GWs determine whether it will establish a direct tunnel or not depending on the traffic information monitored. CPE VPN GW requests the information that is necessary to establishes a direct tunnel to the Center VPN GW Through a simulation, we investigate the performance of the scheme performs better than the SYST scheme with respect to scalability, traffic efficiency and overhead of Center VPN GW, while it shows similar performance to the FVST with respect to end-to-end delay and throughput.

A Study on the Implementation of outdoor type Virtual Private Network Gateway for Smart Grid (Smart Grid를 위한 필드형 가상사설망(VPN) 게이트웨이의 구현)

  • Park, Jun-Young;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.125-136
    • /
    • 2011
  • The vulnerabilities existed in Korean electricity control systems is unexposed because it is being operated in a closed network with superior security. The threat will become greater once the closed network develops into a smart grid environment with superior intelligence. Security will have a greater impact once each household will be connected to the power plant via the smart meter. This research focuses on stable data transfer in harsh external environment and whole-nation coverage network, and suggested standardized and optimized Virtual Private Network (VPN) Gateway architecture to support Power Line Communication (PLC). The functionality and stability of the prototype has been verified with field tests. For implementation of outdoor type VPN device for smart grid, we adopted PLC low voltage remote-meter-net for data communication. Also, IPSec type tunneling and ARIA algorithm based encryption of data collected by PLC low voltage remote meter is transmitted.

A Study on Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment (IPv6 전이 환경에서 IP VPN 모델 분석과 평가에 대한 연구)

  • Kim, Hyung-J.;Yang, Jin-S.;Lee, Eun-S.;Kim, Hee-S.;Kim, Tae-K.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.633-644
    • /
    • 2004
  • For a smooth transition from IPv4 to IPv6 network, the research of transition mechanisms have been processing according to the various network situations. Therefore, we calculate the cost based on the VPN applicable model. Also, we present that conformance between the end point of VPN, the If encapsulation tunneling, applying position of translation mechanism and VPN applicable model are the factors which affect Costs.

Mobile VPN service for the users in foreign networks (외부 네트워크 내 사용자 간 모바일 VPN 지원 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.288-292
    • /
    • 2006
  • 지금까지 모바일 VPN 서비스는 모바일 VPN 사용자가 사내 네트워크 내 CN과 통신하는데 중점적으로 사용되었으나, 모바일 VPN 서비스 사용자가 급증함에 따라 CN이 사내 네트워크 내의 개체가 아닌 외부 네트워크로 이동한 또 다른 모바일 VPN 사용자가 되는 상이한 통신 형태에 대한 모바일 VPN 서비스 지원이 필요해졌다. 기존의 모바일 VPN 서비스를 이러한 형태의 통신에 적용할 경우, 트라이앵글 라우팅 문제로 인하여 효율적인 서비스 지원이 어려워진다. 이에, 본 논문에서는 경로 최적화를 통해 x-HA만을 거치는 라우팅을 제공하고, 변화한 라우팅 경로를 따라 앤드-투-앤드 보안을 효율적으로 제공하기 위해 각 모바일 VPN 사용자가 등록한 x-HA간에 IPsec 터널을 설립, 활용하는 방안을 제시한다.

  • PDF

Mobility Support on Provider Provisioned VPN (Provider Provisioned VPN에서 이동성 지원 방안)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.405-410
    • /
    • 2006
  • 본 논문에서는 PPVPN(Provider Provisioned VPN)에서 PE(Provider Edge) 기반 모바일 VPN 서비스를 제공하기 위한 네트워크 구조 및 이동성 지원 프로토콜을 제안한다. 제안하는 방안은 RFC2547에 제시된 'BGP/MPLS VPN' 기술을 기반으로 하며, BGP/MPLS VPN 서비스를 제공받고 있는 모바일 사용자가 외부 네트워크로 이동했을 때, 모바일 사용자의 VPN 접속 및 이동성을 지원하기 위해 서비스 제공자 측에 PNS(PPVPN Network Server)를 새로이 도입하였다. PNS는 모바일 사용자와 VPN을 매핑하는 바인딩 정보를 유지하며, 모바일 사용자를 서비스하는 외부 네트워크의 GW와 서비스 제공자 네트워크의 PE간 접속회선으로 IPSec 터널을 설립하도록 지시하고, 그 PE에게 모바일 사용자의 VPN 접속에 필요한 정보를 제공하여 그 PE가 BGP/MPLS 동작에 참여하도록 한다.

  • PDF