Study on Virtual Private Network (VPN), VPN's Protocols And Security

Authors

  • K. Karuna Jyothi  IT Department, Sreenidhi Institute of Science and Technology, Ghatkesar, Telangana, India
  • Dr. B. Indira Reddy  IT Department, Sreenidhi Institute of Science and Technology, Ghatkesar, Telangana, India

Keywords:

VPN, Network, Protocols, Encryption, WAN, cost, QoS, Encapsulation, Interoperability, Confidentiality.

Abstract

When an access-desired network is constructed using public network infrastructure such as global Internet to connect remote users or regional offices to company's private network is said to be Virtual Private Network(VPN). A VPN protects the private network, using encryption and other security mechanisms to confirm that only authorized users can access the system and the data can be intercepted. This Literature review paper explains about Virtual Private Network(VPN), It's protocols and Security in VPN.

References

  1. Reuven Cohen and Gideon Kaempfer, “On the Cost of Virtual Private Networks”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000.
  2. L. Keng Lim Jun Gao T.S. Eugene Ng Prashant Chandra Peter Steenkiste Hui, “Customizable Virtual Private Network Service with QoS”, Zhang Carnegie Mellon University Pittsburgh, PA 15213, August 1, 2000.
  3. ZaoAqun and Yuaan Yuan, “RESEARCH ON TUNNELING TECHNIQUES in VIRTUAL PRIVATE NETWORKS”, 2000, IEEE.
  4. O. Satty Joshua, “IP-VPN Architecture and Implementation”, 13 December 2001.
  5. Yurcik and W. Doss, “A planning framework for implementing VPNs”, Volume: 3 Issue: 3, May-June 2001.
  6. Zhi (Judy) Fu1 and S. Felix Wu2, “Automatic Generation of IPSec/VPN Security Policies in an Intra-Domain Environment”,12th International Workshop on Distributed Systems, Oct:15-17,2001.
  7. Dr.Gray, “Virtual Private Network”, IS 311, Tuesday 7pm, November 19, 2002.
  8. Sid, “The Advantages of a Virtual Private Network for Computer Security”, Sid Sirisukha School of Information Technology Auckland University of Technology, 2003.
  9. Networks and Chris Metz, “The Latest in Virtual Private”, Cisco Systems, JANUARY- FEBRUARY 2003.
  10. Shashank Khanvilkar and Ashfaq Khokhar, “Virtual Private Networks: An Overview with Performance Evaluation”, University of Illinois at Chicago, IEEE Communications Magazine, October 2004.
  11. Sachin Ganu1, Martin Kappes, A.S. Krishnakumar, P. Krishnan and Lookman Fazal, “Tackling Security Vulnerabilities in VPN-based Wireless Deployments”, ,IEEE Communications Society, 2004 IEEE.
  12. Yoshinori Fujimoto, Tokyo (JP); Tomoki Ohsawa and Tokyo, “VIRTUAL PRIVATE NETWORK”, U.S, Mar. 18, 2004.
  13. Thomas Berger University of Salzburg, “Analysis of Current VPN Technologies”, Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06) 2006 IEEE.
  14. E. Ramaraj and S. Karthikeyan, “A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking”, Journal of Computer Science, Science Publications, 2006.
  15. Sergio Chacon, Driss Benhaddou, and Deniz Gurkan, “Secure Voice over Internet Protocol (VoIP) using Virtual Private Networks (VPN) and Internet Protocol Security (IPSec)”, IEEE,2006.
  16. Benjamin Odiyo, Mukunda Dwarkanath, Virtual Private Network, 2007.
  17. Luca Deri1 and Richard Andrews, D. Hausheer and J. Schönwälder, “N2N: A Layer Two Peer-to-Peer VPN”, Italy Symstream Technologies, Melbourne, Australiarg, (Eds.): AIMS 2008, International Federation for Information Processing 2008.
  18. Mukherjee et a “METHOD AND APPARATUS FOR ENABLING PEER-TO-PEERVIRTUAL PRIVATE NETWORK (P2P-VPN) SERVICES IN VPN-ENABLED NETWORK”, Sep. 2, 2008.
  19. Roy et al, “SYSTEM AND METHOD FOR FORWARDING TRAFFC DATA IN AN MPLS VPN”, Apr. 3, 2008.
  20. “VPN SECURITY”, February 2008.
  21. A.Venkateswari et al, “COMPARATIVE STUDY OF PROTOCOS USED IN VPN”. International Journal of Engineering science and Technology, Vol1 (3), 2009.
  22. H. Bourdoucen, A. Al Naamany and A. Al Kalbani “Impact of Implementing VPN to Secure Wireless LAN”, World Academy of Science, Engineering and Technology 27 2009.
  23. MohdNazri Ismail “Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance”, INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY SCIENCES AND ENGINEERING, VOL. 1, NO. 2, NOVEMBER 2010.
  24. “Mobile Implementations of Virtual Private Networks”, 2010.
  25. Ritu Malik, Rupali Syal, “Performance Analysis of IP Security VPN”, International Journal of Computer Applications Volume 8– No.4, October 2010.
  26. Tarek S. Sobh, Yasser Aly, “Effective and Extensive Virtual Private Network”, Journal of Information Security, Volume 2, 39-49 January 2011.
  27. Kotuliak, P.Rybár and P.Trúchly, “Performance Comparison of IPsec and TLS Based VPN Technologies”,ICETA 2011 • 9th IEEE International Conference on Emerging eLearning Technologies and Applications • StaráLesná, The High Tatras, Slovakia, October 27-28, 2011.
  28. Ritika kajal, Deepshikha Saini and Kusum Grewal, “Virtual Private Network”, Volume 2, Issue 10, October 2012.
  29. Arun Kumar Singh, Shefalika Ghosh Samaddar and Arun K. Misra, “Enhancing VPN Security through Security Policy Management”, Computer Science and Engineering Department, 2012.
  30. Ming-Song Sun, Wen-Hao Wu, “Engineering Analysis and Research of MPLS VPN”, Network Information Center, Harbin University of Science and Technology©2012 IEEE.
  31. Luca Cittadini Giuseppe Di Battista Maurizio Patrignani, L. Cittadini, G. Di Battista, M. Patrignani,, “MPLS Virtual Private Networks”, Advances in Networking, (2013
  32. LUO Zhiyong, YU Guixin, QI Hongzhuo, “Research of A VPN Secure Networking Model”, International Conference on Measurement, Information and Control, Harbin University of Science and Technology Harbin, China, 2013 2nd.
  33. M.A. Mohamed1, M.E.A. Abou-El-Seoud and A.M. El-Feki2, “A Survey of VPN Security”, IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 4, No 1, July 2014.
  34. El bachir El achhab, “On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids”, Network Protocols and Algorithms Vol. 6, No. 3, 2014.
  35. JAYANTHI GOKULAKRISHNAN, “A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES”, Vol. 5 No.4 Aug-Sep 2014.
  36. J. Balu and DR.S. THIRUNIRAI SENTHIL, “SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.2, February- 2014.
  37. Muhamed Elezia and Bujar Raufia, “Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption”, The Authors. Published by Elsevier Ltd. Univeristy,2015.
  38. M. Judith Bellar, “Cloud Computing Security with VPN”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, August 2015.
  39. Sneha Padhiar and Pranav Verma “A Survey on Performance Evaluation of VPN on various Operating System”, IJEDR | Volume 3, 2015.
  40. Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 and Alessandro Mei2, “A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients”, Proceedings on Privacy Enhancing Technologies 2015.
  41. Krithikaa, M. Priyadharsini and C.Subha, “Virtual Private Network – A Survey”, IT Department, Sri Krishna Arts and Science College, Coimbatore, TamilNadu, India, IJTRD | Jan - Feb 2016
  42. Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne1, Mohamed Ali Kaafar1 and Vern Paxson, “An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps”, Berkeley, ACM. ISBN,2016.
  43. Shan Jing Shandong and RunyuanSun, “Study on VPN solution based on multi-campus network”, IEEE,2016.
  44. Sourabh Kumar Vishali Sharma, “A Security Solution for Wireless Local Area Network (WLAN) Using Firewall and VPN”, Innovative Systems Design and Engineering Vol.7, No.7, 2016.
  45. Saugat Bhattarai, “VPN research (Term Paper)”, Kathmandu University, Research · January 2016.
  46. D.Lacković and M. Tomić, “Performance Analysis of Virtualized VPN Endpoints”, MIPRO 2017, May 22- 26, 2017.
  47. M. N. Ogbu, G.N. Onoh and K.C. Okafor “Cloud Based Virtual Private Networks Using IP Tunnelling for Remote Site Interfaces”, , IEEE 3rd International Conference on Electro-Technology for National Development,2017.
  48. Avani, J.Patel and Ankitha Gandhi “A Survey of VPN Performance Evaluation”, IJRITCC | May 2017.
  49. Ayoub BAHNASSE and Ben M’SIK Hassan “New Smart Platform for Automating MPLS Virtual Private Network Simulation”, university of Casablanca, IEEE,2018.
  50. “Easy VPN Configuration Example” https://pdfs.semanticscholar.org/presentation/a650/730b9067fc8cbe2088bb738dee261f3384b6.pdf.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
K. Karuna Jyothi, Dr. B. Indira Reddy, " Study on Virtual Private Network (VPN), VPN's Protocols And Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.919-932, May-June-2018.