Research and Implementation of IPSEC Based on TD-LTE System

2013 ◽  
Vol 427-429 ◽  
pp. 2783-2786
Author(s):  
Lian Fen Huang ◽  
Hang Liu

With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.

2014 ◽  
Vol 610 ◽  
pp. 741-746
Author(s):  
Zuo Zhi Shao ◽  
Jun Feng Qiao ◽  
Hao Li ◽  
Yun Peng Li

While the rapid development of Internet technology and communication technology, SSL VPN (security socket Layer Virtual Private Network) as a new remote access technology about network application layer, not only based on the proven SSL protocol, but meet the needs of most of network users. In recent years, enterprise networks have been widely used. However, due to its structure so that all access and calculation must be processed through VPN service, which appeared insufficient memory, computing speed to keep up with other issues. This article proposed some improvement based on these issues, using the improved algorithm to encrypt the ellipse. Keywords-SSL;VPN;Ellipsealgorithm


2014 ◽  
Vol 686 ◽  
pp. 210-219
Author(s):  
Guo Fang Zhang

The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.


2014 ◽  
Vol 989-994 ◽  
pp. 4245-4248
Author(s):  
Jian Wei Chen ◽  
Chuan Sheng Wu ◽  
Jing Pu Jia ◽  
Yan Feng Zhang

This paper mainly analyzed the security of AES(Advanced Encryption Standard) protocol and virtual private network technology ,the network 802.3 and 802.1x/EXP security vulnerabilities: defects of Service Set Identifier and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WPA Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The authentication and encryption method to improve network security measures.


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2021 ◽  
Vol 5 (9 (113)) ◽  
pp. 56-69
Author(s):  
Gulzinat Ordabayeva ◽  
Abdizhapar Saparbayev ◽  
Bibinur Kirgizbayeva ◽  
Gulzat Dzhsupbekova ◽  
Nazira Rakhymbek

A Software-Defined Network (SDN) on a Wide Area Network (WAN) is a computer network that is controlled and created by software. SD-WAN is an emerging research area that has received a lot of attention from industry and government. This technology offers tremendous opportunities to support the creation of consolidated data centers and secure networks. This is an innovation that allows the network to be monitored and programmed so that it can respond to network events caused by security breaches. This solution provides network security, offers a single network management console, and provides complete control over the network architecture. Also controls security in the cloud software-defined infrastructure (SDI), such as dynamically changing the network configuration when forwarding packets, blocking, redirecting, changing Media Access Control (MAC) or Internet Protocol (IP) addresses, limiting the packet flow rate etc. Using SD-WAN technology, it is possible to reduce the cost of dedicated bandwidth channels, achieve a high-quality Virtual Private Network (VPN), and the ability to automatically select a channel for certain channels. The main advantages of SD-WAN are the management of an unlimited number of devices from a single center, reducing the cost of deploying branch infrastructure. According to the results of the survey, 7 % of respondents use SD-WAN for security solutions, 14% at the piloting stage. As a result of the research, it was revealed that by 2024, to increase the flexibility and support of cloud applications, more than 60 % of SD-WAN customers will implement the SASE (Secure Access Service Edge) architecture, which is 30% more than in 2020 and the main concept - application security and cloud functions. Keywords: OpenFlow, Software defined wide area network (SD-WAN), architecture, DDoS attack, WAN network


Sign in / Sign up

Export Citation Format

Share Document