348 research outputs found

    Design and evaluation of a virtual private network architecture for collaborating specialist users

    Get PDF
    The expansion of communication systems is the undeniable advantage of the most contemporary digital technologies. However, when a specialist user such as an inventor or an idea owner communicates through a communication system, their intellects are exposed to theft. Upon the analysis of the requirements of such users, it became evident that in order to implement a global, reliable, yet secure system for specialist users, designing a network architecture that provides centralized private connectivity is crucial. This paper proposes a network architecture that provides centralized private connectivity and accommodates the requirements of the network infrastructure of such a system. The proposed virtual private network (VPN) architecture is designed to provide a trusted environment with centralized control and distributed networking, which is different from existing VPN models. It is entitled as Inventor-Investor Network (IINet) and the name is derived from its significant benefits for inventor and investor sets of users. The real experimental IINet prototype is implemented using OpenVPN. For the purpose of evaluation, round trip time (RTT) is measured and reported as the performance metric based on the different encryption ciphers and digest ciphers as the network metrics

    Description and Experience of the Clinical Testbeds

    Get PDF
    This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these sites after 18 months of the Project. It also provides an interim description of early experiences with deployment and usage of these applications, components and technologies, and their clinical service impact

    Network Access Control: Disruptive Technology?

    Get PDF
    Network Access Control (NAC) implements policy-based access control to the trusted network. It regulates entry to the network by the use of health verifiers and policy control points to mitigate the introduction of malicious software. However the current versions of NAC may not be the universal remedy to endpoint security that many vendors tout. Many organizations that are evaluating the technology, but that have not yet deployed a solution, believe that NAC presents an opportunity for severe disruption of their networks. A cursory examination of the technologies used and how they are deployed in the network appears to support this argument. The addition of NAC components can make the network architecture even more complex and subject to failure. However, one recent survey of organizations that have deployed a NAC solution indicates that the \u27common wisdom\u27 about NAC may not be correct

    Simultaneous Implementation Of Ssl And Ipsec Protocols For Remote Vpn Connection

    Get PDF
    A Virtual Private Network is a wide spread technology for connecting remote users and locations to the main core network. It has number of benefits such as cost-efficiency and security. SSL and IPSec are the most popular VPN protocols employed by large number of organizations. Each protocol has its benefits and disadvantages. Simultaneous SSL and IPSec implementation delivers efficient and flexible solution for companies’ with heterogeneous remote connection needs. On the other hand, employing two different VPN technologies opens questions about compatibility, performance, and drawbacks especially if they are utilized by one network device. The study examines the behavior of the two VPN protocols implemented in one edge network device, ASA 5510 security appliance. It follows the configuration process as well as the effect of the VPN protocols on the ASA performance including routing functions, firewall access lists, and network address translation abilities. The paper also presents the cost effect and the maintenance requirements for utilizing SSL and IPSec in one edge network security devic

    The Use of Firewalls in an Academic Environment

    No full text

    Architectural Model and Modified Long Range Wide Area Network (LoRaWAN) for Boat Traffic Monitoring and Transport Detection Systems in Shallow Waters

    Get PDF
    Monitoring the movement of boats in shallow waters requires a real-time monitoring system. However, for small-size wooden boats, they are still monitored manually, and data is unavailable in real time, which makes it difficult to effectively monitor them. The integration of IoT platforms with the boat monitoring system is a challenging task, especially in the transport system. This paper has the objective of developing an architectural model of a modified LoRaWAN-based boat monitoring system that is connected to a GPS-based mobile device and base station. The proposed architectural model is an integration of Bluetooth Low Energy (BLE) and LoRaWAN networks, which are also tested in real time to solve the boat traffic monitoring issues. The field tests with parameters of signal transmission, location coordinates, and position of the boats are also presented. The analysis result shows the proposed model is suitable for waters with high noise levels, especially in shallow water and delta rivers. The signal noise can be reduced by extracting the real-time data. In addition, signal interference can be minimized. The performance of this system is also compared to the reference system in real conditions, which shows an adequate correlation result. This proof of concept forms an important basis for deploying it for large-scale applications and commercialization capabilities. Doi: 10.28991/ESJ-2023-07-04-011 Full Text: PD

    Comparative analysis on virtual private network in the internet of things gateways

    Get PDF
    A virtual private network (VPN) connects a private network to the internet, primarily the public network, through a secure tunnel. Using a local area network (LAN) segment, users can send and receive data from their colleagues in different locations on the network. The development of VPN allows users to gain access to company applications and databases. Therefore, data can be transmitted through a secure tunnel without the need to configure port forwarding for the internet of things (IoT) gateway, allowing users to access it from any location in the world. A method such as dataplicity and pitunnel was examined to compare with the conventional setting. This research paper examines the current deployment of VPN connections in IoT gateways, discussing their characteristics, benefits, and drawbacks, as well as comparing them. The advantage of this method is that the IoT gateway is always accessible and has internet connectivity, which is a significant benefit. Dataplicity is a more trustworthy option because they offer excellent assistance for both the backend and frontend environments

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Full text link
    In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.Comment: 55 page
    • …
    corecore