Nothing Special   »   [go: up one dir, main page]

Skip to main content

Application of Data Encryption for Building Modern Virtual Private Networks

  • Conference paper
Theory and Engineering of Complex Systems and Dependability (DepCoS-RELCOMEX 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 365))

Included in the following conference series:

Abstract

The aim of this article is to present drawbacks of the most popular version/ application of virtual private network service based on Internet Protocol Security (IPsec) as well as to describe the most interesting alternatives used to develop modern business services. Firstly, the article presents history of virtual private network (VPN) and focuses particularly on Secure VPN, where data are encrypted. Secondly, it discusses various aspects of using IPsec VPN while requirements of enterprises are constantly rising. Thirdly, it indicates examples of DMVPN (Dynamic Multipoint VPN) and GETVPN (Group Encrypted Transport VPN) used for implementing private services in hub-and-spoke and full-mesh architecture. DMVPN is generally recommended for usage over public networks, where it creates a VPN and secures it. DMVPN is a very good security improvement for MPLS VPN. GETVPN is favorable to secure existing VPN over private networks. Contrary to DMVPN, it uses distinct polices and multiple overlays, which give limited interoperability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Laskowski, D., Łubkowski, P.: Confidential Transportation of Data on the Technical State of Facilities. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the Ninth International Conference on DepCoS-RELCOMEX. AISC, vol. 286, pp. 313–324. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  2. Łubkowski, P., Laskowski, D.: Test of the Multimedia Services Implementation in Information and Communication Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the Ninth International Conference on DepCoS-RELCOMEX. AISC, vol. 286, pp. 325–332. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  3. Jankuniene, R., Jankunaite, I.: Route Creation Influence on DMVPN QoS. In: 31st International Conference on Information Technology Interfaces, pp. 609–614. SRCE Univ. Computing Centre, Croatia (2009)

    Google Scholar 

  4. Malinowski, T., Arciuch, A.: The procedure for monitoring and maintaining a network of distributed resources. In: Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 947–954. IEEE (2014)

    Google Scholar 

  5. Cisco Systems, Inc.: Dynamic Multipoint VPN (DMVPN) Design Guide (2006)

    Google Scholar 

  6. Cisco Systems, Inc.: Group Encrypted Transport VPN (GETVPN) Design and Implementation Guide (2012)

    Google Scholar 

  7. Conlan, P.J.: Cisco Network Professional’s Advanced Interworking Guide (2009)

    Google Scholar 

  8. Nowosielski, L., Łopatka, J.: Measurement of Shielding Effectiveness with the Method Using High Power Electromagnetic Pulse Generator. In: Progress In Electromagnetics Research Symposium, PIERS 2014 Conference Proccedings, China, pp. 2687–2691 (2014)

    Google Scholar 

  9. Sławińska, M., Butlewski, M.: Efficient Control Tool of Work System Resources in the Macro-Ergonomic Context. In: Applied Human Factors and Ergonomics, AHFE Conference, pp. 3780–3788 (2014)

    Google Scholar 

  10. Konieczny, Ł., Burdzik, R., Figlus, T.: Possibility to control and adjust the suspensions of vehicles. In: Mikulski, J. (ed.) TST 2013. CCIS, vol. 395, pp. 378–383. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Krzykowska, K., Siergiejczyk, M.: The impact of new technologies on the safety level of air traffic. In: Proceedings of the European Safety and Reliability Conference, Safety and Reliability: Methodology and Applications, p. 18. CRC Press/Balkema (2015)

    Google Scholar 

  12. Nowakowski, T., Werbińska-Wojciechowska, S.: Data gathering problem in decision support system for means of transport maintenance processes performance development, pp. 899–907. CRC Press/Balkema, Amsterdam, The Netherlands (2014)

    Google Scholar 

  13. Jasiulewicz-Kaczmarek, M.: Sustainability: Orientation in Maintenance Management -Theoretical Background. In: Golinska, P., et al. (eds.) Eco-Production and Logistics. Emerging Trends and Business Practices, pp. 117–134. Springer

    Google Scholar 

  14. Siergiejczyk, M., Krzykowska, K., Rosiński, A.: Parameters analysis of satellite support system in air navigation. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds.) Proceedings of the Twenty-Third International Conference on Systems Engineering. AISC, vol. 330, pp. 673–678. Springer, Heidelberg (2015)

    Google Scholar 

  15. Jin, W., et al.: Scalable and Reconfigurable All-Optical VPN for OFDM-Based Metro-Access Integrated Network. Journal of Lightwave Technology 32, 318–325 (2014)

    Article  Google Scholar 

  16. Simion, D., et al.: Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. International Journal of Computers Communications & Control 8, 136–145 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcin Pólkowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pólkowski, M., Laskowski, D., Łubkowski, P. (2015). Application of Data Encryption for Building Modern Virtual Private Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19216-1_38

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19215-4

  • Online ISBN: 978-3-319-19216-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics