TCP/IP protocol suite is used to transfer the information among various networks/users located at remote sites. The transfer of information can be subjected to a lot of vulnerabilities, which can be overcome by providing authentication, confidentiality, integrity, etc. The TCP/IP has been implemented with IPSec to provide protection to packets that are transferred through internet. This paper discusses various protocols used for the protection from attacks by providing authentication check and confidentiality to data. The comparison has been made to identify the best suitable protocol and techniques used for the improvement in the performance of IPSec. This paper discusses various issues encountered when new techniques are implemented to enhance IPSec performance. The security flaws in the algorithms have also been summarized. VPN is also an example which describes the best suitable use of IPSec. This paper explores the VPN and various vulnerabilities present in it.
CITATION STYLE
Chopra, G., Jha, R. K., & Lone, F. (2017). A survey on wireless security: IP security concern. In Advances in Intelligent Systems and Computing (Vol. 468, pp. 711–722). Springer Verlag. https://doi.org/10.1007/978-981-10-1675-2_70
Mendeley helps you to discover research relevant for your work.