StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Securing Data Using IPSec VPN - Research Proposal Example

Cite this document
Summary
The paper "Securing Data Using IPSec VPN" describes that all relevant databases may not be accessible. Useful information will be extracted from previous experiments, simulations, and tests. However, the lack of primary data may hamper original research at least to a limited extent…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Securing Data Using IPSec VPN
Read Text Preview

Extract of sample "Securing Data Using IPSec VPN"

Securing Data Using IPSec VPN over Satellite Communication I.D. of the Securing Data Using IPSec VPN over Satellite Communication 1. Introduction Cyber attacks are becoming more common with the lapse of time and data protection has emerged as a major issue in today’s world of IT and telecommunications. That is why organizations now prefer to establish their own, private networks. Virtual private network or VPN technology is very useful in this regard. 2. Motivation For communication over long distances and with overseas destinations, a VPN must operate compatibly with satellite communications systems (Ground Control 2014). However, there are many difficulties in achieving this. The proposed study is primarily aimed at assessing and eliminating the functional issues around operating a VPN over satellite communication systems. Special focus will be put on Internet Protocol Security or IPSec protocol suite based VPN technology. 3. Research Questions How can we secure the network between the two sides (those are the sender and the receiver)? How the VPN works over satellite? Which techniques can we use to secure the data? What is the unique feature of using VPN over the satellite? 4. Aims and Objectives 1. To conduct an extensive research on scholarly texts about network security with special emphasis on VPN and satellite communications 2. To collect and explain the tests and experiments done so far for evaluating and analyzing the performance of IPSec VPN over satellite 3. To reflect on new data protection techniques and protocol designs for producing better VPN over satellite solutions 4. To draw a useful conclusion and furnish recommendations for improving IPSec VPN functionality over satellite communication systems 5. Literature Review A VPN is a kind of relatively secure network communication system. With the help of tunneling techniques (for example, HTTP tunnel), tunneling protocols (Layer 2 Tunneling Protocol or L2TP), IPSec technology, etc., a VPN is capable of operating as a secure and cost-effective network even inside the framework of a public network infrastructure (Bentley Walker 2012). Providers are now establishing VPN compatible with satellite communication systems (Siris, Ververidis, and Polyzos 2013). However, according to Fereidooni, Taheri, and Mahramian (2012:228): “In essence, a VPN provides a secured tunnel between two end points across a public network. The protocols used over the Internet (TCP/IP) are designed for reliable end-to-end data delivery over unreliable and congested networks … However, satellite bears a high latency (delay) medium and TCP response to such latency is not in a determined way.” 5.1 Overview of existing work In general, satellite modems are utilized for operating a VPN over satellite. These modems help to send TCP/IP data in the form of radio frequency or RF. They also help in receiving TCP/IP data from the RF signals. This kind of network communication system is termed as the “VPN over satellite” (Bentley Walker 2012, paragraph 1; Ground Control 2014) technology, which has become a crucial necessity for remote users. While analyzing the security issues around VPN, Zhu and Ma (2004) stated that public key infrastructure (PKI) can be especially helpful along with dedicated network level key exchange protocols to enhance data protection. Within a few years, Demirel, Alagoz, and Ufuk (2006) stated that flow identification methods too are crucial for IPSec VPN technology operated via satellites. Much later, Fereidooni et al (2009) developed an enhanced version of IPSec VPN, which they termed as ML-IPSec+. The authors further claimed that ML-IPSec+ was capable of significantly improving TCP performance over the satellite links. Contextually, the European Broadcasting Union (2013:9) or EBU stresses the importance of “data access via UMTS/LTE”, where an IP link is established over satellite for operating either IP VPN, IPSec VPN, or MPLS (Multiprotocol Label Switching) VPN. And most recently, Sun (2014) has stated that the MPLS technique is a viable culmination point of enhanced IPSec VPN. By MPLS technique, the IP header of the packet data is manipulated such that both encryption and speed can be ensured. The multiple labeling techniques can use “label stacking, allowing MPLS to utilize a network hierarchy, provide virtual private network (VPN) services (via tunneling) and support multiple protocols” (Sun 2014:364). 5.2 Limitations of existing work Although considerable amounts of research and analysis have been accomplished in this area, limitations do exist. According to Gomez and Fazli (2013), solving protocol improvement issues do not guarantee solution to network address translation problems and/or quality of service or QoS related obstacles. Moreover, regulations and technologies often vary from one satellite communication system to another, which give rise to frequent and serious compatibility issues (Sun 2014). 5.3 Potential directions and ideas for improvement Researchers like Fereidooni et al (2009) aim at developing a vastly improved edition of IPSec VPN. In order to achieve this end, the researchers attempt to modify various characteristics of IPSec. Also, features from other protocols such as L2TP are appended to an IPSec VPN environment. But another approach involves synchronizing multiple protocols inside one VPN over satellite system. MPLS is an apt example of this approach, where various protocols are put together such that their most relevant features can function most optimally (Sun 2014). Last but not least, Gomez and Fazli (2013) want to develop a provider centric approach. In this approach, the IPSec VPN service provider must have both the power and the responsibility of ensuring smooth functionality over satellite systems. 5.4 Expected results and impact on the field The proposed research is expected to extensively explain the benefits and the drawbacks of an IPSec VPN operating over satellite links. Also, it would summarize and utilize the different experiments, simulations, and/or tests that have been conducted so far to examine the capabilities of a VPN over satellite. Development of numerous and relevant theoretical implications for improving IPSec is also expected from this study. 6. Research Methodology The proposed study will principally involve library and Internet research. Major portions of the research will involve building an extensive literature review to facilitate meta-analytical research and generation of themes. The themes will be then be utilized to select, analyze and explain relevant tests, simulations, and/or experiments linking to optimization of IPSec and enhancements in VPN over satellite. 6.1 Research challenges Exploration and analysis of Internet and/or library databases are a crucial task. This task is poised to become quantitative in nature, requiring simple statistical analyses at a later stage. Also, all relevant databases may not be accessible. Useful information will be extracted from previous experiments, simulations and tests. However, lack of primary data may hamper original research at least to a limited extent. References Bentley Walker (2012). Challenges of VPN Over Satellite. Hampshire: Bentley Walker. Retrieved on 18th September from http://www.bentley-walker.com/articles/101. Demirel, D., Alagoz, F., & Ufuk, M. (2006). IPSec over satellite links: A new flow identification method. In: Proceedings of the 7th IEEE International Symposium on Computer Networks (pp. 140-145). New York: IEEE European Broadcasting Union (2013). SLA for Media Transport Services – High Level Guidelines. Geneva: European Broadcasting Union Fereidooni, H., Parichereh, A., Taheri, H., Mahramian, M. & Eliasi, B. (2009). ML-IPSec+: An end to end accelerated VPN for satellite links. International Journal of Computer Science and Network Security, 9, 379-386 Fereidooni, H., Taheri, H., & Mahramian, M. (2012). E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks. Intl J. of Communications, Network and System Sciences, 5, 228-237 Gómez, D., & Fazli, E. (2013). Issues and solutions when deploying VPNs over satellite links. In: Personal Satellite Services (pp. 113-118). New York and Heidelberg: Springer Ground Control (2014). VPN Over Satellite Solutions. Atascadero: Grand Control. Retrieved on 18th September from http://www.groundcontrol.com/VPN_Over_Satellite.htm. Siris, V. A., Ververidis, C. N., & Polyzos, G. C. (2013). Techno-economic gains analysis of services over an information-centric integrated satellite-terrestrial network. In: Future Network and Mobile Summit (Future Network Summit), 2013 (pp. 1-10). New York: IEEE. Sun, Z. (2014). Satellite networking: principles and protocols. Hoboken: Wiley Zhu, J.-M. & Ma, J.-F. (2004). An Internet key exchange protocol based on public key infrastructure. Journal of Shanghai University, 8, 51-56 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Securing Data using IPSEC VPN over Satellite Communication Research Proposal”, n.d.)
Securing Data using IPSEC VPN over Satellite Communication Research Proposal. Retrieved from https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication
(Securing Data Using IPSEC VPN over Satellite Communication Research Proposal)
Securing Data Using IPSEC VPN over Satellite Communication Research Proposal. https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication.
“Securing Data Using IPSEC VPN over Satellite Communication Research Proposal”, n.d. https://studentshare.org/information-technology/1657225-securing-data-using-ipsec-vpn-over-satellite-communication.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing Data Using IPSec VPN

Network Security Technologies

(Zwicky et al, 2000) vpn is the abbreviation of Virtual Private Network.... ?? According to the experts at vpn Consortium, the major rationale of a vpn is to provide the company with the similar facilities as privately held leased lines can provide.... Additionally, technologists are striving to keep vpn technology cheaper and simpler without making considerable usage of public infrastructure through sharing or cloud computing....
4 Pages (1000 words) Essay

Internet Protocol Security (IPsec)

Figure 1 Dedicated Leased Lines vpn Since these lease lines were private the information sent or retrieved remained within the related parties and so the communication was fast and secure.... Figure 2 Dial-up vpn Although the networking was achieved, yet the effort was not that useful as the speed of these networks was very slow.... This report ''Internet Protocol Security (ipsec)'' presents an overview of the ipsec technology....
11 Pages (2750 words) Report

Cryptographic Overhead of IPsec Protocol Suit

The most common services of IPSec (internet protocol security) implementation are vpn (virtual private networking) services utilized on current networks such as the Internet, which can ensure the safe transmission of useful data and information over public infrastructure.... From the paper "Cryptographic Overhead of ipsec Protocol Suit" it is clear that ipsec is not a single protocol, however, it is a complete suite of protocols and contains a variety of protocols in which each protocol is responsible for performing specific tasks....
5 Pages (1250 words) Research Paper

The Development of the Internet Protocol Security

Thus the main important concern or worry about this broadband technology such as virtual private network or vpn is the security.... It defines how a vpn can be set up using the IP addressing protocol.... ipsec is, therefore, a protocol suite that actually secures the Internet Protocol communication between the networks by encrypting and authenticating the data transmitted.... (Doraswamy & Harkins, 2003)ipsec, therefore, provides a robust mechanism to provide security to IP and higher layer protocols....
8 Pages (2000 words) Research Paper

Installing and Administering IPSec

he structure of the report is as follows: 1st section describes the IPSec standard and implementation of security in the network using ipsec.... This paper "Installing and Administering ipsec" presents an introduction of a security standard, called, ipsec and its capabilities in ensuring secure communication in the network.... ipsec basically uses a combination of protocols such as Authentication Header, Encapsulating Security Payload, etc....
9 Pages (2250 words) Term Paper

IPSec and Cryptography

IPsec is very vital since it offers numerous solutions to virtual private networking (vpn), by giving communication security against untrusted network like the internet.... The paper "ipsec and Cryptography" offers a clear discussion of the major functions of ipsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process.... The paper further discusses the limitations of the ipsec in relation to the used algorithms and attacks against ipsec....
6 Pages (1500 words) Essay

Securing Data Using IPSEC VPN over Satellite Communication

This reseaerch paper ''Securing Data Using IPSec VPN over Satellite Communication'' intents how internet protocol security virtual private network (IPSEC VPN) secures the procedure of data transmission over other methods like satellite communication systems; and discusses the various significant.... Simultaneously, ipsec vpn is represented as 'Internet Protocol Security Virtual Private Networks', which aids in transferring data through the network of cryptographic protocols in order to protect 'Internet Protocol' (IP) traffic....
18 Pages (4500 words) Research Paper

IP-SEC Site to Site VPN Connectivity

This article "IP-SEC Site to Site vpn Connectivity" presents Site-to-site virtual private networks (vpn) tunnels that have been adopted for secure data, voice, and video transmission between two areas or sites, for example, branches or offices.... A Virtual Private Network (vpn) refers to a network technology developed for creating a network connection that is secure over a public network such as service provider-owned private networks and the internet....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us