A survey on wireless security: IP security concern

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

TCP/IP protocol suite is used to transfer the information among various networks/users located at remote sites. The transfer of information can be subjected to a lot of vulnerabilities, which can be overcome by providing authentication, confidentiality, integrity, etc. The TCP/IP has been implemented with IPSec to provide protection to packets that are transferred through internet. This paper discusses various protocols used for the protection from attacks by providing authentication check and confidentiality to data. The comparison has been made to identify the best suitable protocol and techniques used for the improvement in the performance of IPSec. This paper discusses various issues encountered when new techniques are implemented to enhance IPSec performance. The security flaws in the algorithms have also been summarized. VPN is also an example which describes the best suitable use of IPSec. This paper explores the VPN and various vulnerabilities present in it.

Author supplied keywords

Cite

CITATION STYLE

APA

Chopra, G., Jha, R. K., & Lone, F. (2017). A survey on wireless security: IP security concern. In Advances in Intelligent Systems and Computing (Vol. 468, pp. 711–722). Springer Verlag. https://doi.org/10.1007/978-981-10-1675-2_70

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free