USAGI IPv6 IPsec Development for Linux
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
IEEE Internet Computing
CIT '05 Proceedings of the The Fifth International Conference on Computer and Information Technology
Analysis of Current VPN Technologies
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Saving Public Addresses in Mobile IP
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
Analysis of IPSec overheads for VPN servers
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts
IEEE Communications Magazine
Virtual private networks: an overview with performance evaluation
IEEE Communications Magazine
An IMS-based service platform for the next-generation wireless networks
IEEE Communications Magazine
Hi-index | 0.00 |
Virtual Private Networks (VPNs) are normally used for secured communications over the Internet. The VPNs have evolved significantly over the years, leading to a range of open-source and proprietary solutions. In Converged, all-IP networks terminal mobility introduces, however, new challenges that have so far been addressed only partially and via proprietary solutions. In this article we assess the level of maturity, the viability and performance achieved in mobile VPNs, based merely on open-source software. Our prototype MVPN is obtained by integrating IPv6, Mobile IPv6 and IPsec, i.e., the protocols that 3GPP envisions for all-IP, mobile and fixed networks. We perform a series of tests on a multi-access wireless network (WLAN, GPRS and UMTS), aimed at identifying the issues arising when mobility management (vertical and horizontal handover) is combined with different levels of network security. Tests led to the discovery of various results such as the flushing of routing tables in MIPv6 during handover. Our performance analysis is complemented with lessons learnt and recommendations.