On Demand Network-wide VPN Deployment in GPRS

نویسندگان

  • Christos Xenakis
  • Lazaros Merakos
چکیده

The Mobile Internet requires enhanced security services available to all mobile subscribers in a dynamic fashion. A network-wide Virtual Private Network (VPN) deployment scenario over the General Packet Radio Service (GPRS) is proposed and analyzed from a security viewpoint. The proposed security scheme improves the level of protection that is currently supported in GPRS and facilitates the realization of Mobile Internet. It secures data transmission over the entire network route from a mobile user to a remote server by utilizing the default GPRS ciphering over the radio interface, and by deploying an IP VPN over the GPRS core, as well as on the public Internet. Thus, ondemand VPN services are made available for all GPRS network subscribers and roaming users. The VPN functionality, which is based on the IPsec framework, is outsourced to the network infrastructure so as to eliminate the potential computational overhead on the mobile device. The VPN initialization and key agreement procedures are based on an Internet Key Exchange (IKE) protocol proxy scheme, which enables the mobile station to initiate a VPN establishment, while shifting the complex key negotiation to the network infrastructure. The deployed VPN operates transparently to the mobile subscribers’ movement. The required enhancements for security service provision can be integrated in the existing network infrastructure, and therefore, the proposed security scheme can be employed as an add-on feature to the GPRS standard.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure VPN Deployment in GPRS Mobile

The growth of the Internet and the success of mobile networks suggest that the next trend will be an increasing demand for mobile access to Internet applications. It is therefore increasingly important that mobile radio networks support these applications in an efficient manner. Moreover, in such a hybrid environment, where clients are connecting to ever growing networks in an ad-hoc fashion, t...

متن کامل

Dynamic network-based secure VPN deployment in GPRS

A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...

متن کامل

Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network

Based on the need for secure and reliable mobile communication, this paper investigates the applicationperceived throughput of an end-to-end VPN connection using IPSec over GPRS. GPRS is of particular interest regarding performance issues due to its wide deployment but limited capacity. To this end, different encryption and authentication algorithms are considered. The throughput is measured on...

متن کامل

Network Programmability for VPN Overlay Construction and Bandwidth Management

Reliability and security concerns have increased demand for Virtual Private Networks (VPNs). Ideally, a VPN service should offer autonomous overlay networks with guaranteed bandwidth allocations over a shared network. Network providers seek an automated VPN creation and management process, while users of a VPN would greatly benefit from secure control over the handling of their traffic. Current...

متن کامل

SIP over IP VPN: Performance Analysis

With rapid growth in use of multimedia applications, including IP Telephony (also known as Voice over IP), the demand for security and privacy of communications has significantly increased. Given the fact that IP Telephony utilizes public IP infrastructure, deployment of IP VPN is one approach to protect traffic of interest. However, VPN is presumed to have a negative impact on VOIP performance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012