Design and Implementation of Secure Communication Between Two Branches of a Company Using IPSEC Based VPN ( Virtual Private Network ) Protocol

Authors

  • V. Sushma  ECE Department, S.V.U College of Engineering, Tirupati, Andhra Pradesh, India
  • T. Venkateswarlu  ECE Department, S.V.U College of Engineering, Tirupati, Andhra Pradesh, India

Keywords:

VPN, IPSec, Routing, OSPF, Authentication, Encryption, Encapsulation

Abstract

Now a day's most of the corporate business network infrastructure needs to securely transfer data across the Internet. Data can be a company’s top-secret information regarding product designs, product release dates, patent information, HR employee investigations, etc. This project provides insight for a secure solution to this business need using Virtual Private Network (VPN).There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. IPSec is a protocol suite for securing internet protocol communications via authenticating and encrypting every IP packet of a conversation session. A tunnel is created to secure VPN communication through WAN between two participants. A tunnel can provide Privacy, Content reliability and authentication and Sender authentication and if using certificates no repudiation (via data origin authentication). Juniper SRX Security devices supports the IPSec VPN tunnel formation not only using Policies, it can also be done by routing a traffic to a virtual interface called st0 interface which reduces the burden of policy verification. The aim is to configure a separate secure tunnel logical unit. With route-based VPNs, organizations define the VPN overlay links and then define the static routes that will be used for transport, allowing the route, to determine which traffic goes through the VPN.

References

  1. Djedjiga Benzid, Michel Kadoch, "Virtual Private Network over Wireless Mesh Networks" International Conference on Future Internet of Things and Cloud 2014. IEEE computer society.
  2. O. E. Muogilim, K.-K. Loo, and R. Comley, "Wireless mesh network security: A traffic engineering management approach," Journal of Network and Computer Applications, vol. 34, pp. 478-491, 3// 2011
  3. Ming-SongSun,Wen-HaoWu, "Engineering Analysis and Research of MPLS VPN" Network Information Center, Harbin University of Science and Technology, Harbin, china, IEEE 2013.
  4. R.Maresca,M.Arienzo,M.Esposito, S.P.Romano and G.Ventre, "An Active Network approach to Virtual Private Networks" Proceedings of the Seventh International Symposium on computers and communications (ISCC’02), 2002.
  5. Mateusz Korona, Krysztof Skowron, Mateusz Trzepinski, Mariusz Rawski, "FPGA implementation of IPsec protocol suiteformultigigabitnetworks" International Conference on Systems, Signals and Image Processing (IWSSIP), 2017.
  6. Sebastian Marius Rosu, Marius Marian Popescu, George Drogoi, Ioana Raluca Guica, "The Virtual Enterprise Network based on IPSec VPN Solutions and Management"(IJACSA)International Journal of Advanced Computer Science and Applications.Vol.3, No.11, 2012.
  7. Sonika, Monika, Sonal, "Network Security: Virtual Private Network" International Journal of Engineering and Computer Science ISSN:2319-7242, Volume3 Issue2 February, 2014.
  8. Peter B.Busschbach, "Toward QOS-Capable Virtual Private Networks" Bell Labs Technical Journal, October-December 1998.
  9. Tripti Sharma, Rahul Yadav, "Security in Virtual private network" International Journal of Innovations & Advancement in Computer Science IJIACS, ISSN 2347-8616 Volume4, Special Issue March 2015.
  10. Antonin Mazalek, Zuzana Vranova, Eva Stankova, "Analysis of the Impact of IPSec on Performance Characteristics of VoIP Networks and Voice Quality" University of Defence, Department of Communication and Information Systems.
  11. Junaid Latief Shah, Javed Parvez, "Impact of IPSec on Real Time Applications in IPv6 6to4 Tunneled Migration Network" IEEE Sponsored 2nd International Conference on Innovations inInformationEmbeddedand Communications Systems ICIIECS’15, 2015.
  12. LUOZhiyong,YUGuixin,QI Hongzhuo, LIU Yahui, "Research of A VPN Secure Networking Model" 2nd Internal Conference on Measurement, Information and Control, 2013.
  13. LI Gang, XUE Yibo, WANG Dongsheng, Design and Implementation of a Gigabit Rate Network Intrusion Prevention SystemJ], Journal of Chinese Computer Systems, pp: 2025-2029,2006.
  14. Shaneel Narayan, Cameron J.Williams, Daniel K.Hart, Max W.Qualtrough, "Network Performance Comparision of VPN protocols on Wired and Wireless Networks" International Conference on Computer Communication and Information (ICCCI) Jan 08-10, 2015.
  15. Richard S.Kagan, "Virtual Private Networks-New Strategies for Secure Enterprise Networking" VPNet Technologies, San Jose, USA, IEEE 1998.
  16. Victor Neumann, Clodomiro Unsihuay, Christian Lyra Gomes,Keiko V.Fonseca, PedroRodriguesTorres, "Parameterization of IPsec Framework for Security in the Smart Grid Interoperability", "Latency and Throughput IPsec Overhead" IEEE PES innovative Smart Grid Technologies Latin America(ISGTLATAM), 2015.
  17. IETF-RFC 6071. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. Internet Engineering Task Force (IETF). Request for Comments, p. 1-63, February 2011. ISSN: 2070-1721.
  18. Cryptography and network security, William Stallings "Voice Security in Virtual Private Network "Deep Shikha Computer Science and Engineering ITM University Sec 23-A Gurgaon, India. Volume 3, Issue 7, July 2013
  19. Mohd Nazri Ismail and MohdTaha Ismail. "Analysing of Virtual Private Network over Open Source Application and Hardware Device Performance". European Journal of Scientific Research (EJSR), Vol. 28 No.2, pp. 215-226, Euro Journals Publishing, Inc. 2009.
  20. Rosen E, Rekhter Y, RFC 4364 BGP/MPLS IP Virtual Private Networks (VPNs)S], IETF, 2006
  21. Pylarinos,S.Louvros,K.IoannouA.Gramps and S.Kotsopoulos, "Traffic analysis in GSM/GPRS networks using voice pre-emption priority, "World Scientific and Engineering Academy and Society, pp.120-123, 2005
  22. Luo Zhiyong, Duo Zhihua, Qiao Peili, Formal Description of IPSec Security Policy in VPN NetworksJ], Journal of Hua Zhong University of Science and Technology (Natural Science Edition), pp: 14-16,2011.
  23. Ma Chunguang, Firewall Intrusion Detection VPNM], Beijing University of Posts and Telecommunications Press, pp: 158-166,2008.
  24. GuangLu Sun, Yibo Xue, Yingfei Dong, Dongsheng Wang, Chenglong Li. A Novel Hybrid Method for Effectively Classifying Encrypted TrafficC], Proceedings of IEEE Globecom, pp: 7-9, Miami, USA, 2010.
  25. Wang Wende, AES-Rijndael Algorithm IPSec VPNJ], Liaocheng University (Natural Science), pp: 107-110,2008.
  26. Cohen R. On the Establishment of an Access VPN in Broadband Access NetworksJ], IEEE Communications Magazine, pp: 156-163,2003.
  27. LI Gang, XUE Yibo, WANG Dongsheng, Design and Implementation of a Gigabit Rate Network Intrusion Prevention SystemJ], Journal of Chinese Computer Systems, pp: 2025-2029,2006.
  28. L1U Kelong, QING Sihan, Meng Yang, An Improved Way on Kerberos Protocol Based on Public-Key AlgorithmsJ]. Journal of Software, pp: 872-877,2001.
  29. Neuman, B. Ts' 0, T. Kerberos, An Authentication Service for Computer Networks. IEEE Communications, pp: 12 4-130, 1994.
  30. SUN Guang-Iu, LANG Fei, YANG Ming-Ming, Traffic Measurement System Based on Hybrid MethodsJ]. Electric Machines and Control, pp: 91-96,2011.

Downloads

Published

2018-08-30

Issue

Section

Research Articles

How to Cite

[1]
V. Sushma, T. Venkateswarlu, " Design and Implementation of Secure Communication Between Two Branches of a Company Using IPSEC Based VPN ( Virtual Private Network ) Protocol, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 9, pp.575-580, July-August-2018.