Content area
Full Text
Abstract
Data security plays a crucial role in modern times; most business is transacted over the internet and even to wireless devices, which is much more vulnerable than when running on an internal network. It can be intercepted by non-authorized people; this explains why considerable effort is being devoted at the current time to data encryption and secure transmission. This paper focuses mainly on performing a comparative study of the existing VPN security and encryption techniques.
Keywords: Virtual Private Network (VPN), Internet Protocol Security (IPsec), Encryption Techniques
1. Introduction
Recently secure access to the private sources is considered as of the essential needs. Thus, one of the most efficient and cost-effective ways for granting secure access needs from far path in the organizations is the use of VPN [1]. VPN is a popular service to logically construct a geographically dispersed LAN. This logical private network can securely communicate data using Internet [2]. Most private networks lack data security and allow hackers to have access to read and attack the data directly. A VPN shares a network that data can be passed through the private traffic in the way that only authorized users have access to it. IPsec-based VPNs can be established on different types of networks such as ATM, Frame Relay, MPLS, and internet. Since the internet is cheaper and accessible, however, users prefer to use it instead. There are different types of virtual private networks due to operational requirements, however, several ways to create each of these VPNs are available [3]. IPsec based VPN uses encryption method for data security. In order to make this process possible, VPNs connect and combine public and private networks to each other, encrypt packets that are transferred in the net, and increase the resistance of net in front of hackers attack, data retouch, and robbery [4]. The main purpose of VPNs is to prevent the sniff of data that are being sent in the connection platform and the other one is to maintain the integrity of untrusted networks [5]. The next of this paper is organized as follows; section-2 provides the related work, section-3 present IPsec overview, section-4 introduces VPN encryption methodologies, and section-5 presents conclusions.
2. Related Work
The purpose of VPNs is to get access...