A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols

Authors

  • Gabriel Popescu Military Technical Academy

Keywords:

security, protocol, tunnel, cryptography, algorithm, virtual private network, analysis

Abstract

In this paper, a comparative analysis of the major modern tunneling protocols used for  secure virtual private network implementations based on the Internet infrastructure will be elaborated.  The purpose of the paper is to help specialists to choose proper protocols for the specific practical implementations. The need for virtual private networks is explained as an introduction. The technical considerations are iterated, and a full classification of all types of virtual private networks is made, by providing the criteria used. The major tunneling protocols of interest and their advantages and disadvantages are described next. The comparative analysis is presented as a table showing the relevant characteristics of each tunneling protocol. Finally, real world best practices of the tunneling protocols iterated are shown as a conclusion.

Author Biography

Gabriel Popescu, Military Technical Academy

Master of Information Technology Security

References

Meeta Gupta, Building a Virtual Private Network, Premier Press, 2003

Mark Lewis, Comparing, Designing and Deploying VPNs, Cisco Press, 2006

Downloads

Published

2010-12-30

How to Cite

Popescu, G. (2010). A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols. Journal of Mobile, Embedded and Distributed Systems, 2(2), 91-100. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/26