Skip to main content
Top

2018 | OriginalPaper | Chapter

Mobile VPN Schemes: Technical Analysis and Experiments

Authors : Daouda Ahmat, Mahamat Barka, Damien Magoni

Published in: e-Infrastructure and e-Services for Developing Countries

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A new class of Virtual Private Networks (VPN), which supports both security and mobility, has recently emerged. Called mobile VPN, these systems provide not only secure tunnels but also session continuity mechanisms despite location change or connection disruptions. These mechanisms enable secure sessions to survive in dynamic/mobile environments without requiring a renegotiation of security keys during the session resumption phase. In this paper, we compare four open-source mobile VPNs in terms of functionality and performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Berger, T.: Analysis of current VPN technologies. In: The First International Conference on Availability, Reliability and Security, ARES 2006, 8 pp. (2006) Berger, T.: Analysis of current VPN technologies. In: The First International Conference on Availability, Reliability and Security, ARES 2006, 8 pp. (2006)
3.
go back to reference Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) architecture. IETF RFC 4423 (2006) Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) architecture. IETF RFC 4423 (2006)
4.
go back to reference Eronen, P.: IKEv2 mobility and multihoming protocol (MOBIKE). IETF RFC 4555 (2006) Eronen, P.: IKEv2 mobility and multihoming protocol (MOBIKE). IETF RFC 4555 (2006)
5.
go back to reference Ahmat, D., Magoni, D.: MUSeS: mobile user secured session. In: 5th IFIP Wireless Days International Conference, Dublin, Irland Ahmat, D., Magoni, D.: MUSeS: mobile user secured session. In: 5th IFIP Wireless Days International Conference, Dublin, Irland
6.
go back to reference Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley, New York (2008)CrossRef Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley, New York (2008)CrossRef
7.
go back to reference Binkley, J.: An integrated IPsec and mobile-IP for freeBSD. Technical report, pp. 01–10 (2001) Binkley, J.: An integrated IPsec and mobile-IP for freeBSD. Technical report, pp. 01–10 (2001)
8.
go back to reference Aoyagi, S., Takizawa, M., Saito, M., Aida, H., Tokuda, H.: ELA: a fully distributed VPN system over peer-to-peer network. In: Symposium on Applications and the Internet, pp. 89–92 (2005) Aoyagi, S., Takizawa, M., Saito, M., Aida, H., Tokuda, H.: ELA: a fully distributed VPN system over peer-to-peer network. In: Symposium on Applications and the Internet, pp. 89–92 (2005)
10.
go back to reference Kent, S., Seo, K.: Security architecture for the internet protocol. IETF RFC 4301 (2005) Kent, S., Seo, K.: Security architecture for the internet protocol. IETF RFC 4301 (2005)
11.
go back to reference Perkins, C.: IP mobility support for IPv4. IETF RFC 3344 (2002) Perkins, C.: IP mobility support for IPv4. IETF RFC 3344 (2002)
12.
go back to reference Motorolla: Mobile VPN, secure connectivity on the move. White paper (2008) Motorolla: Mobile VPN, secure connectivity on the move. White paper (2008)
13.
go back to reference Braun, T., Danzeisen, M.: Secure mobile IP communication. In: 26th IEEE Conference on Local Computer Networks, pp. 586–593 (2001) Braun, T., Danzeisen, M.: Secure mobile IP communication. In: 26th IEEE Conference on Local Computer Networks, pp. 586–593 (2001)
14.
go back to reference Choi, H., Song, H., Cao, G., La Porta, T.: Mobile multi-layered IPsec. In: 24th Joint Conference of the IEEE Computer and Communications Societies, pp. 1929–1939 (2005) Choi, H., Song, H., Cao, G., La Porta, T.: Mobile multi-layered IPsec. In: 24th Joint Conference of the IEEE Computer and Communications Societies, pp. 1929–1939 (2005)
15.
go back to reference Ruppelt, R., Pelinescu, A., Constantin, C., Floroiu, J., Sisalem, D., Butscher, B.: Building ALL-IP based virtual private networks in mobile environment. In: International Work on Informatic and Mobile Communication over Wireless LAN, Research and Applications (2001) Ruppelt, R., Pelinescu, A., Constantin, C., Floroiu, J., Sisalem, D., Butscher, B.: Building ALL-IP based virtual private networks in mobile environment. In: International Work on Informatic and Mobile Communication over Wireless LAN, Research and Applications (2001)
16.
go back to reference Adrangi, F., Levkowetz, H., Statement, P.: Mobile IPv4 traversal of virtual private network gateways. IETF RFC 4093 (2005) Adrangi, F., Levkowetz, H., Statement, P.: Mobile IPv4 traversal of virtual private network gateways. IETF RFC 4093 (2005)
17.
go back to reference Vaarala, S., Klovning, E.: Mobile IPv4 traversal across IPsec-based VPN gateways. IETF RFC 5265 (2008) Vaarala, S., Klovning, E.: Mobile IPv4 traversal across IPsec-based VPN gateways. IETF RFC 5265 (2008)
18.
go back to reference Devarapalli, V., Eronen, P.: Secure connectivity and mobility using mobile IPv4 and IKEv2 mobility and multihoming (MOBIKE). IETF RFC 5266 (2008) Devarapalli, V., Eronen, P.: Secure connectivity and mobility using mobile IPv4 and IKEv2 mobility and multihoming (MOBIKE). IETF RFC 5266 (2008)
19.
go back to reference Karbasioun, M.M., Berenjkub, M., Taji, B.: Securing mobile IP communications using MOBIKE protocol. In: International Conference on Telecommunications (2008) Karbasioun, M.M., Berenjkub, M., Taji, B.: Securing mobile IP communications using MOBIKE protocol. In: International Conference on Telecommunications (2008)
20.
go back to reference Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network mobility (NEMO) basic support protocol. IETF RFC 3963 (2005) Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network mobility (NEMO) basic support protocol. IETF RFC 3963 (2005)
21.
go back to reference Petrescu, A., Olivereau, A.: Mobile VPN and V2V NEMO for public transportation. In: 9th International Conference on Intelligent Transport Systems Telecommunications, pp. 63–68 (2009) Petrescu, A., Olivereau, A.: Mobile VPN and V2V NEMO for public transportation. In: 9th International Conference on Intelligent Transport Systems Telecommunications, pp. 63–68 (2009)
22.
go back to reference Ishimura, K., Tamura, T., Mizuno, S., Sato, H., Motono, T.: Dynamic IP-VPN architecture with secure IPsec tunnels. In: Symposium on Information and Telecommunication Technologies (2010) Ishimura, K., Tamura, T., Mizuno, S., Sato, H., Motono, T.: Dynamic IP-VPN architecture with secure IPsec tunnels. In: Symposium on Information and Telecommunication Technologies (2010)
23.
go back to reference Migault, D., Palomares, D., Herbert, E., You, W., Ganne, G., Arfaoui, G., Laurent, M.: E2E: an optimized IPsec architecture for secure and fast offload. In: International Conference on Availability, Reliability and Security, pp. 365–374 (2012) Migault, D., Palomares, D., Herbert, E., You, W., Ganne, G., Arfaoui, G., Laurent, M.: E2E: an optimized IPsec architecture for secure and fast offload. In: International Conference on Availability, Reliability and Security, pp. 365–374 (2012)
24.
go back to reference Deri, L., Andrews, R.: N2N: a layer two peer-to-peer VPN. In: Interntional Conference on Autonomous Infrastructure, Management and Security, pp. 53–64 (2008) Deri, L., Andrews, R.: N2N: a layer two peer-to-peer VPN. In: Interntional Conference on Autonomous Infrastructure, Management and Security, pp. 53–64 (2008)
25.
go back to reference Gurtov, A., Korzun, D., Lukyanenko, A., Nikander, P.: Hi3: an efficient and secure networking architecture for mobile hosts. Comput. Commun. 31(10), 2457–2467 (2008)CrossRef Gurtov, A., Korzun, D., Lukyanenko, A., Nikander, P.: Hi3: an efficient and secure networking architecture for mobile hosts. Comput. Commun. 31(10), 2457–2467 (2008)CrossRef
30.
go back to reference Aura, T., Nagarajan, A., Gurtov, A.: Analysis of the HIP base exchange protocol. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 481–493. Springer, Heidelberg (2005). doi:10.1007/11506157_40 CrossRef Aura, T., Nagarajan, A., Gurtov, A.: Analysis of the HIP base exchange protocol. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 481–493. Springer, Heidelberg (2005). doi:10.​1007/​11506157_​40 CrossRef
31.
go back to reference Tiendrebeogo, T., Ahmat, D., Magoni, D., Sié, O.: Virtual connections in P2P overlays with DHT-based name to address resolution. Int. J. Adv. Internet Technol. 5(1), 11–25 (2012) Tiendrebeogo, T., Ahmat, D., Magoni, D., Sié, O.: Virtual connections in P2P overlays with DHT-based name to address resolution. Int. J. Adv. Internet Technol. 5(1), 11–25 (2012)
32.
go back to reference Autefage, V., Magoni, D.: Network emulator: a network virtualization testbed for overlay experimentations. In: 17th IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, pp. 38–42 (2012) Autefage, V., Magoni, D.: Network emulator: a network virtualization testbed for overlay experimentations. In: 17th IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks, pp. 38–42 (2012)
Metadata
Title
Mobile VPN Schemes: Technical Analysis and Experiments
Authors
Daouda Ahmat
Mahamat Barka
Damien Magoni
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-66742-3_9

Premium Partner