Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
How to design a trustworthy IPsec VPN device employing nested tunnels?
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
2018 (English)Independent thesis Advanced level (degree of Master (One Year)), 40 credits / 60 HE creditsStudent thesis
Abstract [en]

Enterprises use site-to-site \textit{Virtual Private Network} (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products, organizations partially rely on the vendors to keep their communication out of reach from malicious groups or individuals. These VPN servers consist of thousands of subcomponents, which can be grouped into \textit{hardware, operating system, general software, protocols, and algorithms}. The main idea of this study is to design an IPsec VPN architecture based on \textit{IPsec nesting}. This is achieved by designing two servers that consist of different subcomponents on each layer. Thus, a vulnerability in one component will not necessarily put the entire IPsec communication at risk. The subcomponents picked for deployment are investigated and reviewed based on their trustworthiness, which will be based on later defined criteria. This trust analysis will act as a potential starting point for providing a framework for future trust assessments.

Place, publisher, year, edition, pages
2018. , p. 54
Keywords [en]
Nesting, IPSec, nested, tunnel, encryption
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ltu:diva-71046OAI: oai:DiVA.org:ltu-71046DiVA, id: diva2:1252171
External cooperation
Combitech AB
Educational program
Information Security, master's level (60 credits)
Supervisors
Examiners
Available from: 2018-10-03 Created: 2018-10-01 Last updated: 2018-10-03Bibliographically approved

Open Access in DiVA

fulltext(2083 kB)148 downloads
File information
File name FULLTEXT01.pdfFile size 2083 kBChecksum SHA-512
453bf05b1d1bd18613ca461030682dddd248ce3d2488ae52735fab80130967d0f110004e979f1f71913b97ed9cd1153094f0a46dfbc22fa08b03a9c52419c412
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Spottka, Alexander
By organisation
Computer Science
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 148 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 99 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf