CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Performance Evaluation of IPSEC-VPN on Debian Linux Environment

by A. A. Ajiya, U. S. Idriss, Jerome M. G.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 45
Year of Publication: 2019
Authors: A. A. Ajiya, U. S. Idriss, Jerome M. G.
10.5120/ijca2019918592

A. A. Ajiya, U. S. Idriss, Jerome M. G. . Performance Evaluation of IPSEC-VPN on Debian Linux Environment. International Journal of Computer Applications. 181, 45 ( Mar 2019), 39-44. DOI=10.5120/ijca2019918592

@article{ 10.5120/ijca2019918592,
author = { A. A. Ajiya, U. S. Idriss, Jerome M. G. },
title = { Performance Evaluation of IPSEC-VPN on Debian Linux Environment },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2019 },
volume = { 181 },
number = { 45 },
month = { Mar },
year = { 2019 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number45/30425-2019918592/ },
doi = { 10.5120/ijca2019918592 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:00.103467+05:30
%A A. A. Ajiya
%A U. S. Idriss
%A Jerome M. G.
%T Performance Evaluation of IPSEC-VPN on Debian Linux Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 45
%P 39-44
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyberspace has gotten a great favour from the general public in recent times. Affordability of infrastructure and globalization are believed to be the main drivers. This development resulted to lots of business enterprises to conceive a secure Virtual Private Network (VPN). Internet Protocol Security (IPSEC) which is one of the most widely used and deployed VPN tunneling Protocol in today’s networks. However, it is extremely difficult for one to find out the information about its performances comparatively with different encryption algorithms. In this research, the performance differences were evaluated through empirical observation. The experimental analysis was done on Debian Linux environment by implementing IPsec tunneling protocol with different encryption algorithms. Encryption algorithms are used to encrypt data so it cannot be read or modify by a third-party while in transit. Triple Data Encryption Standard (TDES/3DES) and Advance Encryption Standard (AES) are the encryption algorithms used in this research. The study concluded that IPSec AES-sha1 provides fair and reasonable performance compare to IPSec 3DES-sha1. Also, the research indicated that encryption/decryption of VPN UDP (User Datagram Protocol) traffic requires large amount of CPU and memory and that contributed to performance degradation.

References
  1. Adeyinka, O. (2008). Analysis of IPsec VPNs Performance in a Multimedia Environment. Association for Computing Machinery.
  2. Alshamsi, A. and Saito, T. (2005) A technical comparison of IPSec and SSL. IEEE: 19th International Conference for Advanced Information Networking and Applications, 2 p.395 - 398.
  3. Boulanger, J. and Bailly, B. (2009) Performance Analysis of Two Secure tunneling mechanisms: IPSec VPN versus SSL VPN. Ensimag Grenoble, p.1 - 13.
  4. GovHK (2008). The Government of the Hong Kong Special Administrative Region: VPN Security.
  5. Jaha, A., Fathi B. S. and M. A. (2007) Performance Evaluation for Remote Access VPN on Windows Server 2003 and Fedora Core 6. IEEE: TELSIKS, p.587 - 592.
  6. Jaha, A., Fathi B. S. and M. A. (2008) Performance Evaluation for Remote Access VPNs on Windows Server 2003. IEEE Second International Conference on Next Generation Mobile Applications, Services, and Technologies, p.582 - 587.
  7. Kotuliak, I., P. Rybár and P. Trúchly. (2011) Performance Comparison of IPsec and TLS Based VPN Technologies. 9th IEEE International Conference on Emerging eLearning Technologies and Applications, p.217 - 221.
  8. Likhar, P., Ravi Y. and Keshava M. R. (2011) Performance Evaluation of Transport Layer VPN on IEEE 802.11g WLAN. Journal of Institute of Electrical and Electronics Engineers, (197) p.407 - 415.
  9. Linuxplayer.org (2011) Openswan – Use the KLIPS stack. [Online] Available at: http://www.linuxplayer.org/2011/02/openswan-use-the-klips-stack [Accessed: 31 Jul 2012].
  10. Mazlan Zaharuddin, M., Ruhani Ab Rahman and Murizah Kassim. (2010). Technical Comparison Analysis of Encryption Algorithm on Site-to-Site IPSec VPN. International Conference on Computer Applications and Industrial Electronics, p.641 - 645.
  11. Malik, R. and Syal, R. (2010) Performance Analysis of IP Security VPN. International Journal of IP Security VPN, 8 (4), p.5 - 8.
  12. Narayan, S., Kris B. and Simon de Vere. (2009).Network Performance Analysis of VPN Protocols. IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, (367), p.645 - 648.
  13. Narayan, S., Michael F. and S. R.. (2010). Empirical Network Performance Evaluation of IPSec Algorithms on Windows Operating Systems Implemented on a Test-bed. Journal of Institute of Electrical and Electronics Engineers.
  14. Nessoft.com (2011).What is Jitter?. [Online] Available at: http://www.nessoft.com/kb/article/what-is-jitter-57.html [Accessed: 31 Jul 2012].
  15. O. Elkeelany, M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi and J. Qaddour. (2002). Performance analysis of IPSec protocol: Encryption and authentication. IEEE International Conference.
  16. Scribd.com (2009). Openswan Installation and Configuration Tutorial. [Online] Available at: http://www.scribd.com/doc/15585156/Openswan-Installation-and-Configuration-Tutorial [Accessed: 30 Jul 2012].
  17. Shue, C., Youngsang S., M. Gupta and Jong Youl Choi. (2005) Analysis of IPSec Overheads for VPN Servers. 1st IEEE ICNP Workshop on Secure Network Protocols.
Index Terms

Computer Science
Information Sciences

Keywords

Virtual Private Network (VPN) User Datagram Protocol (UDP) Internet Protocol Security (IPSEC) Advance Encryption Standard (AES) Data Encryption Standard (3DES).