The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other modern communication technologies boost mobile network, thus their utilization is critical to moving the business forward. However, these widely used networks are also vulnerable to security threats, leading network vendors and technicians to implement various techniques to ensure network safety. As the need to safeguard technologies grow and there has been a significant increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the threat to network security. the authors suggested looking into this issue and presenting the findings of a study that contained insightful observations from the literature reviews that served as the primary source of research besides questionnaire responses as opinions from those who have experience in the network industry and its security. Through this research, it became evident that several technologies and approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a superior solution, particularly for mobile networks.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
The basic concept of a VPN is to connect networks in separate offices in such a way that
makes them appear as a single network.The investigation of using peer-to-peer communication
began due to the low performance of traditional, client-server based model. The bandwidth and
latency of the communication between the connected clients , was improved by virtual private
networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses
both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to
transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes
direct communication for the clients possible.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
The basic concept of a VPN is to connect networks in separate offices in such a way that
makes them appear as a single network.The investigation of using peer-to-peer communication
began due to the low performance of traditional, client-server based model. The bandwidth and
latency of the communication between the connected clients , was improved by virtual private
networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses
both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to
transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes
direct communication for the clients possible.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
The Difference Impact on QoS Parameters between the IPSEC and L2TPAM Publications
Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
The usage of VPN services not only helps to connect different entities and organizations, it as well forms the critical component upon which various interactive services related to offering internet coverage. As various business localities and settings relating to private network augments so does the various interconnecting prerequisites as well as the network intricacy. The usage of VPN as well forms a decisive aspect for the reason that network management has turned out to be more essential and even more expensive. Undeniably, a good number of the large private networks often surpass the dimension and intricacy of smaller ones, and it is a reason as to why the virtual private network has to be excellently studied to showcase the diverse benefits that permit it to connect, retain and even sustain diverse business models. In this regard, the paper aims to discuss the diverse interconnect functionalities of VPN; it examines various VPN operations along with the various network security concerns.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions to IP routers to support broadcasting data in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender s to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word multicast is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "Classroom Shared Whiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27976.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27976/classroom-shared-whiteboard-system-using-multicast-protocol/wit-yee-swe
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
More Related Content
Similar to EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY FOR MOBILE NETWORKS: AN INVESTIGATION STUDY
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
The usage of VPN services not only helps to connect different entities and organizations, it as well forms the critical component upon which various interactive services related to offering internet coverage. As various business localities and settings relating to private network augments so does the various interconnecting prerequisites as well as the network intricacy. The usage of VPN as well forms a decisive aspect for the reason that network management has turned out to be more essential and even more expensive. Undeniably, a good number of the large private networks often surpass the dimension and intricacy of smaller ones, and it is a reason as to why the virtual private network has to be excellently studied to showcase the diverse benefits that permit it to connect, retain and even sustain diverse business models. In this regard, the paper aims to discuss the diverse interconnect functionalities of VPN; it examines various VPN operations along with the various network security concerns.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions to IP routers to support broadcasting data in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender s to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word multicast is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "Classroom Shared Whiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27976.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27976/classroom-shared-whiteboard-system-using-multicast-protocol/wit-yee-swe
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY FOR MOBILE NETWORKS: AN INVESTIGATION STUDY
1. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
DOI: 10.5121/ijnsa.2023.15503 33
EXPLORING THE EFFECTIVENESS OF VPN
ARCHITECTURE IN ENHANCING NETWORK
SECURITY FOR MOBILE NETWORKS: AN
INVESTIGATION STUDY
Khawla Azwee1
, Mokhtar Alkhattali1
and Mostafa Dow2
1
Department of Computer Science, High Institute of Science and Technology,
Qaser Bin Ghashir, Libya
2
Department of Computer Science, College of Science and Technology, Jadu, Libya
ABSTRACT
The rapid development of technology in communications has transformed the operations of companies and
institutions, paving the way for increased productivity, revenue growth, and enhanced customer service.
Multimedia calls and other modern communication technologies boost mobile network, thus their
utilization is critical to moving the business forward. However, these widely used networks are also
vulnerable to security threats, leading network vendors and technicians to implement various techniques to
ensure network safety. As the need to safeguard technologies grow and there has been a significant
increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the
threat to network security. the authors suggested looking into this issue and presenting the findings of a
study that contained insightful observations from the literature reviews that served as the primary source
of research besides questionnaire responses as opinions from those who have experience in the network
industry and its security. Through this research, it became evident that several technologies and
approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a
superior solution, particularly for mobile networks.
KEYWORDS
VPN, TLS, Mobile Networks, Network Security, Risk Mitigation.
1. INTRODUCTION
In today's digital age use of digital technology has become ubiquitous in almost every aspect of
modern life. This has led to an increase in the use of digital transformation in the work of
organizations and institutions, which has led to raising the level of service provision in terms of
ease of use and security. Due to the presence of a wide range of applications and programs
provided by companies to communicate with customers and provide their services electronically
(27), as a result, focusing on the security aspect for networks has become one of the most
important priorities for these institutions and companies(1). However, with the increasing use of
networks, especially multi-use networks for encapsulating audio and video files(29), the ability to
scale real-time data traffic, and dynamic memory usage, network security has become a major
concern. As the use of the Internet as a basis for network design increases the security problem
and facilitates network penetration. To overcome this problem, a virtual private network (VPN) is
created for network security(20),this network connection provides a secure alternative to public
networks by connecting multiple customer sites to a shared network with similar security
measures as a private network. It allows these customer sites to access the network and exchange
2. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
34
data with each other while ensuring the safety and privacy of their information. This network
serves as a reliable and protected connection that mimics the functionality of a VPN to ensure
secure communication between the customer sites involved. (3-14).
There are two main categories of VPN protocols, namely Site-to-Site VPN and Remote VPN.
Site-to-Site VPN is basically to connect more than one customer using the internet to transfer
information securely(5-7-26). Mostly the protocols used in VPN are Sit-to-sit Internet Protocol
Security (IPSec),Generic Routing Encapsulation (GRE) and Multiprotocol Label Switching
(MPLS). To serve as a medium for securely transmitting information. A Remote Access protocol
can be provided using MPLS, Transport Layer Security (TLS), and IPSec (15-19-25).In terms of
scalability, MPLS VPN is among the best. IPSec ensures the transmission of data over an IP
network while also providing the reliability, credibility, confidentiality, and safety of the
information transmitted using this technology. As for what is known as TLS, it is widely used on
the Web (10-18). However, the use of VPNs brings with it certain risks, particularly if they are
used over public internet connections. Thus, it is essential to carefully analyze and select the
appropriate VPN architecture for mobile networks(13). This paper aims to study the various types
of VPN solutions available for the mobile network and provide recommendations on the best
VPN architecture for the mobile network, based on the analysis and opinion of a group of
specialists, and the data collected from literature studies and online questionnaires or interviews.
This research also has many significant implications, particularly for organizations seeking to
secure their mobile network communications, and provides a valuable resource for network
administrators, and security personnel and a good reference for researchers.
2. RELATED WORKS
For organizations seeking to maintain secure remote access to their online resources, VPNs
ensure the confidentiality and integrity of transmitted data. Several VPN technologies can
provide different levels of security and efficiency, including TLS, MPLS, and IPSec. This allows
organizations to choose the VPN solution best suited to their specific needs(3-9).
The MPLS protocol has emerged as an important enhancement to networks as it supports many
services to improve the efficiency and functionality of IP networks (6). MPLS simplifies
encryption and traditional complex routing protocols to create secure communication channels by
adding a label to each packet (23), which enables faster and more accurate routing within the
network while maintaining data security and confidentiality. Moreover, MPLS supports traffic
engineering to avoid network congestion and ensure the most efficient use of resources to
minimize delays and packet loss, thus being very useful for applications with stringent Quality of
Service (QoS) requirements and very useful in multimedia traffic (28-30).The MPLS backbone
encapsulates VPN frames and transmits them using MPLS labels at Layer 2 by integrating
various Layer 2 services, such as ATM Cell Relay and Ethernet, with MPLS to integrate with
MPLS functionalities to provide a comprehensive networking solution (22).To establish
connectivity, between locations, within a VPN, Layer 3 MPLS VPNs rely on the utilization of
Multiprotocol Border Gateway Protocol (MP BGP). They offer flexibility, security, and
segmentation advantages over traditional overlay VPN technologies (6).The adoption of MPLS
technology brings benefits to both service providers and enterprises. Service providers find
MPLS cost-effective, and enterprises utilize MPLS features such as Traffic Engineering and Fast
ReRoute for improved connectivity and network management (29).
IPv6 mandates security features like confirmation and encryption. Internet Protocol Security
(IPSec), which is interoperable across vendors, provides secure communication over networks
and enables the creation of VPNs (21).IPSec enables secure access to organizational networks
through a local call to an Internet Service Provider (ISP) while extending security to both wired
3. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
35
and wireless connections (3). Its implementation requires dynamic IP addresses, client protection,
network shielding, and robust authentication (32).Implementing IPSec at the network level
ensures strong security and requires no modifications to user applications or server systems (17).
It can establish secure virtual subnets within a company, providing security for individual users
or specific applications (16).
Cryptographic protocol TLS can be used at the application layer, the transport layer in the mobile
network security stack, and commonly at the application layer to secure web traffic, email
communications, and other applications that require a secure connection. In mobile networking
environments networked devices rely on Protocol TLS in the transport layer to enable
communication (3–8–17). This becomes crucial for mobile network operators as TLS encryption
safeguards the data between devices ensuring a high level of information security (11).
3. METHODOLOGY OF THE RESEARCH
The researchers utilized two methods for gathering information as shown in figure 1.
Fig1. Methods used to collect information in this study.
The First Method
served as the primary source of data and involved conducting a literature review. This involved
searching for relevant academic materials from libraries, specialized journals, and online articles
related to the subject of the study. In addition, researchers utilized specific keywords to narrow
down the search and focused on obtaining reliable and credible references, both open-source and
paid. The collected data was then condensed and summarized to facilitate faster access and
comprehension of information, leading to clear and concise results. Reasonable conclusions were
drawn based on the available evidence, and a comprehensive qualitative data analysis approach
was employed. Following data reduction and presentation, a thorough analysis was conducted to
ensure alignment with the study's objectives. The results derived from these sources are deemed
highly reliable with dependable results to enhance understanding.
The Second Method
A questionnaire was distributed to reinforce the results obtained from the initial data collection
method. The survey was administered to 130 engineers from the best four private
companies(PCo) as internet service providers, state-owned telecommunications companies, and
academic institutions in Libya. To ensure accuracy, the researchers conducted field visits to each
company, dedicating one day for each organization to meet with the target participants. The
respondents were required to possess a master's degree or possess a minimum of 10 years of
4. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
36
experience in the fields of networks, communications, and data and information security. Gender,
age, and nationality were not emphasized, as the focus was on acquiring relevant information.
The study sample comprised respondents from diverse sectors, with 54.6% affiliated with
academic faculty, 17.7% representing private communication and technology firms, 12.3%
associated with AlmadarAljadid mobile network company, 8.5% affiliated with Libyana, a
mobile network operator, and 6.9% from Libyan Post Telecommunication and Technology(LTT).
And Figure 2 displays the number of participants in the questionnaire according to the companies
they work for.
Fig 2. Shows the number of survey participants from each institution.
This heterogeneity within the participant composition allowed for a broad spectrum of
perspectives on mobile networks, consequently offering invaluable insights into network security
pertaining to VPN technologies.
3.1. Types of Survey Questions
A collection of inquiries was presented in the following format across 10 samples containing 25
questions, each these inquiries explore various aspects of MPLS, IPSec, and TLS protocols,
encompassing their respective strengths and weaknesses in addition to their primary
characteristics and ratings categorized accordingly. A final question was included at the
conclusion of the questionnaire, inquiring as to the respondent's personal recommendation for a
VPN protocol deemed most suitable for deployment within the mobile network industry.
3.1.1. Sample of Questions Used for the Interview and Investigation
[1] What are the advantages of MPLS?
[2] What are the disadvantages of TLS?
[3] What are the main features of TLS Encryption?
[4] What are the main features of MPLS?
[5] What are the disadvantages of using IPSec?
[6] Estimate MPLS, IPSec,TLS with respect to remote A (from 1 to 5 Ratings).
[7] Estimate IPSec, MPLS, TLS with respect to Security (from 1 to 5 Ratings).
[8] Estimate MPLS, TLS, IPSec with respect to QoS (from 1 to 5 Ratings).
[9] Estimate MPLS, IPSec, and TLS with respect to trouble protection (from 1 to 5 Ratings)
[10] Choose one of the three VPN protocols to suggest for use in a mobile network.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
37
4. ANALYSIS PERFORMANCE OF VPN PROTOCOLS
The infrastructure of mobile networks must be carefully considered and studied, particularly in
terms of security and quality, to evaluate VPN technologies and the protocols that are used in the
networks. The main considerations include the ability to deliver data efficiently, support dynamic
tunneling, and adapt to changing network conditions. Thus, when analyzing VPN protocols that
are optimized for mobile networks, it is crucial to take into account specific security features of
the network topology, scalability, site-to-site capabilities, management options, VPN client
compatibility, and network placement. All these factors have been extracted and summarized in a
convenient Table 1 to provide a comprehensive overview for further examination and analysis.
Table 1. Comparison table between TLS, IPSec and MPLS
MPLS-Based VPN IPSec-Based VPN TLS-Based VPN
Topology
Support
Full mesh
Hub and spoke,
Full mesh
Point to point
Security
Limited,
using labels (VPN)
Protection
Strong protection,
using encryption
algorithms
Strong protection,
using encryption
algorithms
Quality of
Service
(QoS)
High, using
Differentiated Services
Medium, using
Differentiated Services
Low to medium, not
specifically used for
QoS
Scalability
High, supports large
networks with many
nodes
Medium, supports small
to medium networks
Low, supports only
point-to-point
connections
Site-to-Site YES YES YES
Management
Complex, requires
specialized skills
Remote access
management not
available
Moderate, requires some
technical skills Remote
access management
available
Easy, widely
supported by software
vendors Remote
access management
available
Remote NO YES YES
VPN Client
Limited, requires
specialized hardware
Widely supported, but
may require software
installation
Not applicable
Place
in
network
Primarily used in
service provider
networks
(core and edge routers)
Used in various types of
networks (firewalls,
routers, gateways)
Primarily used in web
applications and e-
commerce
Transparency
Partial, not all routers
support the same
features
Partial, VPN tunnelling
can sometimes interfere
with network
transparency
Full, operates at the
application layer and
does not interfere with
network transparency
Data integrity Network layer Packet level Transport layer
Threat
protection
Limited Secure data transmission
Secure data
transmission
6. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
38
5. FINDINGS
The performance analysis of these protocols helps readers choose the most appropriate option for
their networking requirements. Readers can make knowledgeable decisions based on their unique
needs for VPN technologies such as MPLS, IPSec, and TLS. All widely used protocols in the
networks, each with its own strengths and weaknesses. When it comes to security measures,
IPSec and TLS are distinguished because they ensure data protection, privacy ability, provide
user authentication and authorization, as well as advanced encryption algorithms. making them
preferred choices in network industries that require stringent data privacy policies. On the other
hand, MPLS is found to be less secure as it transmits user information without encryption over
the public internet, making it at risk of attacks and breaches.
In terms of scalability in networks, MPLS and IPSec both exhibit traits that make them suitable
for accommodating increasing numbers of subscribers and expanding network capacity. In
addition to elasticity and flexibility to allow the network to grow and adapt to changing demands.
However, despite all the features of TLS, it is not as flexible and limits user access to the network
duo to not permitting connections from external sources.
6. CONCLUSIONS
The objective of this research was to explore the different types of VPN technologies and
determine the most suitable one for mobile networks. This aim was accomplished through two
research methodologies (literature survey and questionnaire) on VPN protocols MPLS, TLS, and
IPSec. Based on our findings, TLS and IPSec are suitable options for mobile networks.
Depending on the organization's needs, either TLS or IPSec can be implemented individually.
However, for security, scalability and portability in networks, it is recommended to combine both
TLS and IPSec. This combination provides a comprehensive solution to ensure data privacy and
protection in the mobile network industry. By leveraging the strengths of both TLS and IPSec
organizations can achieve and improve security measures while maintaining the flexibility and
adaptability required for networks. Therefore, utilizing a combination of TLS and IPSec is highly
recommended for organizations aiming to establish an efficient VPN infrastructure in their
networks.
REFERENCES
[1] Akter, H., Jahan, S., Saha, S., Faisal, R. H., & Islam, S. (2022, February). Evaluating performances
of VPN tunneling protocols based on application service requirements. In Proceedings of the Third
International Conference on Trends in Computational and Cognitive Engineering: TCCE 2021 (pp.
433-444). Singapore: Springer Nature Singapore.
[2] Almomani, A. (2022). Classification of Virtual Private networks encrypted traffic using ensemble
learning algorithms. Egyptian Informatics Journal, 23(4), 57-68.
[3] Alshalan, A., Pisharody, S., & Huang, D. (2015). A survey of mobile VPN technologies. IEEE
Communications Surveys & Tutorials, 18(2), 1177-1196.
[4] Amaldeep, S., & Sankaran, S. (2023, May). Cross Protocol Attack on IPSec-based VPN. In 2023
11th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-6). IEEE.
[5] Aung, S. T., & Thein, T. (2020, February). Comparative analysis of site-to-site layer 2 virtual
private networks. In 2020 IEEE Conference on Computer Applications (ICCA) (pp. 1-5). IEEE.
[6] Bensalah, F., El Kamoun, N., &Bahnasse, A. (2017). Evaluation of tunnel layer impact on VOIP
performances (IP-MPLS-MPLS VPN-MPLS VPN IPsec). International Journal of Computer
Science and Network Security (IJCSNS), 17(3), 87
7. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
39
[7] Deshmukh, D., & Iyer, B. (2017, May). Design of IPSec virtual private network for remote access.
In 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp.
716-719). IEEE.
[8] Dowling, B., Fischlin, M., Günther, F., &Stebila, D. (2021). A cryptographic analysis of the TLS
1.3 handshake protocol. Journal of Cryptology, 34(4), 37.
[9] Firdaouss, L., Ayoub, B., Manal, B., & Ikrame, Y. (2022). Automated VPN configuration using
DevOps. Procedia Computer Science, 198, 632-637.
[10] Frahim, J., Santos, O., &Ossipov, A. (2014). Cisco ASA: All-in-one Next-Generation Firewall, IPS,
and VPN Services. Cisco Press.
[11] Gentile, A. F., Fazio, P., & Miceli, G. (2021, November). A Survey on the Implementation and
Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and
Mobile Scenarios. In Telecom (Vol. 2, No. 4, pp. 430-445). MDPI.
[12] Guo, L., Wu, Q., Liu, S., Duan, M., Li, H., & Sun, J. (2020). Deep learning-based real-time VPN
encrypted traffic identification methods. Journal of Real-Time Image Processing, 17, 103-114.
[13] Harmening, J. T. (2017). Virtual private networks. In Computer and Information Security
Handbook (pp. 843-856). Morgan Kaufmann.
[14] Hauser, F., Häberle, M., Schmidt, M., & Menth, M. (2020). P4-ipsec: Site-to-site and host-to-site
vpn with ipsec in p4-based sdn. IEEE Access, 8, 139567-139586.
[15] Ivanov, O., Ruzhentsev, V., &Oliynykov, R. (2018, October). Comparison of modern network
attacks on TLS protocol. In 2018 International Scientific-Practical Conference Problems of
Infocommunications. Science and Technology (PIC S&T) (pp. 565-570). IEEE.
[16] Jain, A. K., Sahoo, S. R., &Kaubiyal, J. (2021). Online social networks security and privacy:
comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.
[17] Jangjou, M., & Sohrabi, M. K. (2022). A comprehensive survey on security challenges in different
network layers in cloud computing. Archives of Computational Methods in Engineering, 29(6),
3587-3608..
[18] Kotuliak, I., Rybár, P., &Trúchly, P. (2011, October). Performance comparison of IPsec and TLS
based VPN technologies. In 2011 9th International Conference on Emerging eLearning
Technologies and Applications (ICETA) (pp. 217-221). IEEE.
[19] López, G., &Grampín, E. (2017, October). Scalability testing of legacy MPLS-based Virtual Private
Networks. In 2017 IEEE URUCON (pp. 1-4). IEEE.
[20] Mavoungou, S., Kaddoum, G., Taha, M., & Matar, G. (2016). Survey on threats and attacks on
mobile networks. IEEE Access, 4, 4543-4572.
[21] Nixon, J. S., & Amenu, M. (2022). Investigating security issues and preventive mechanisms in IPv6
deployment. International Journal, 2, 1-20.
[22] Nugroho, E. (2022). ANALISIS PENCEGAHAN SINGLE POINT OF FAILURE PADA
JARINGAN SERVICE LAYER 2 VPN DENGAN METODE FAST REROUTE MPLS TRAFFIC
ENGINEERING (Doctoral dissertation, InstitutTeknologi Telkom Jakarta).
[23] Pepelnjak, I., & Guichard, J. (2002). MPLS and VPN architectures (Vol. 1). Cisco press.
[24] Ridwan, M. A., Radzi, N. A. M., Wan Ahmad, W. S. H. M., Abdullah, F., Jamaludin, M. Z., &
Zakaria, M. N. (2020). Recent trends in MPLS networks: technologies, applications and
challenges. IET Communications, 14(2), 177-185.
[25] Santhanamahalingam, S., Alagarsamy, S., & Subramanian, K. (2022, October). A study of cloud-
based VPN establishment using network function virtualization technique. In 2022 3rd International
Conference on Smart Electronics and Communication (ICOSEC) (pp. 627-631). IEEE.
[26] Santoso, B., Sani, A., Husain, T., & Hendri, N. (2021). VPN Site To Site Implementation Using
Protocol L2TP And IPSec. TEKNOKOM, 4(1), 30-36.
[27] Sistani, A. K. R., & Patel, A. M. (2016). Design and evaluation of a virtual private network
architecture for collaborating specialist users. Asia-Pacific Journal of Information Technology and
Multimedia, 5(1), 15-30.
[28] Streun, F., Wanner, J., &Perrig, A. (2022). Evaluating Susceptibility of VPN Implementations to
DoS Attacks Using Adversarial Testing. In Proceedings 2022 Network and Distributed System
Security Symposium (p. 43). Internet Society.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.5, September 2023
40
[29] Sulaiman, A. B. R., &Alhafidh, O. K. S. (2014). Performance analysis of multimedia traffic over
MPLS communication networks with traffic engineering. International Journal of Computer
Networks and Communications Security, 2(3), 93-101.
[30] Wibowo, B., &Alaydrus, M. (2019, October). Smart Home Security Analysis Using Arduino Based
Virtual Private Network. In 2019 Fourth International Conference on Informatics and Computing
(ICIC) (pp. 1-4). IEEE.
[31] Yuan, X., Yao, H., Wang, J., Mai, T., &Guizani, M. (2021). Artificial intelligence empowered QoS-
oriented network association for next-generation mobile networks. IEEE Transactions on Cognitive
Communications and Networking, 7(3), 856-870.
[32] Zheng, Y., Li, Z., Xu, X., & Zhao, Q. (2022). Dynamic defenses in cyber security: Techniques,
methods and challenges. Digital Communications and Networks, 8(4), 422-435.
AUTHORS
Mokhtar S. Alkhattali is a dedicated lecturer and the head of the Department of
Computer Science at the High Institute of Science and Technology (HIST), Qaser Bin
Ghashir, Libya. He earned his bachelor's degree in Electrical and Electronic
Engineering from HIST. He graduated at the top of his class. In pursuit of further
knowledge, he completed an MSc degree from Near East University in North Cyprus in
the computer information systems field with distinction in 2016. His research work on
voice recognition. Interest in networks, and developing computer applications. For
more information, contact alkhtale@gmail.com.
Khawla Azwee is presently working as an lecturer assistant of Network Computing in the Department of
Computer & Information Technology, at the Higher Institute of Science and Technology, Qaser Bin
Ghashir, Libya. She obtained her Master of Science in Network Computing in, 2016 from Coventry
University in Uk. She has more than 14 years of teaching experience. Her research interests include
computer networks and information Security..For more information, contact kazwee190@gmail.com.
Mostafa Dow is a dedicated lecturer and the head of the Department of Computer Science at the High
Institute of Science and Technology (HIST), Jadu, Libya. He completed an MSc degree from Near East
University in North Cyprus. For more information, contact mustafa.dwo@gmail.com.