A Survey on Secure and Resilient Session Schemes: Technical Comparison and Assessment
نویسندگان
چکیده
Cyber threats become more and more pervasive on the Internet and on distributed/decentralized systems. In order to secure communication over these infrastructures and respond to mobility constraint, a new class of Virtual Private Networks (VPN), which support both security and mobility, has emerged in the course of last years. Mobile Virtual Private Networks, called mobile VPN, provide not only secure tunnels but also session continuity mechanism despite location change or connection disruptions. This mechanism enables secure sessions to survive in dynamic/mobile environments without requiring a renegotiation of security keys during the session resumption phase. In this paper, on the one hand, we survey the recent literature on the mobile VPN systems followed by a detailed analysis and a technical comparison in tabulated form of existing technologies. On the other hand, we carry out experiments on open source mobile VPN infrastructures. We subsequently outline and discuss major features and performances of various assessed mobile VPN infrastructures. Received on 8 December 2017; accepted on 20 December 2017; published on 12 January 2018
منابع مشابه
Comparison of three different numerical schemes for 2D steady incompressible lid-driven cavity flow
In this study, a numerical solution of 2D steady incompressible lid-driven cavity flow is presented. Three different numerical schemes were employed to make a comparison on the practicality of the methods. An alternating direction implicit scheme for the vorticity-stream function formulation, explicit and implicit schemes for the primitive variable formulation of governing Navier-Stokes equatio...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملEffects of Aggregate Gradation on Resilient Modulus and CBR in Unbound Granular Materials
Resilient modulus and California Bearing Ratio (CBR) in unbound granular materials are the key technical characteristics of layers in a flexible pavement design. Among the factors affecting these two parameters, the aggregate gradation is the most important. Using particle size distribution curve developed by AASHTO, together with other considerations mentioned in the related regulations have y...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EAI Endorsed Trans. Ubiquitous Environments
دوره 4 شماره
صفحات -
تاریخ انتشار 2018