Liu Li, Hu Peng, Li Jin-sheng, Hong Pei-lin. Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1310-1314.
Citation:
Liu Li, Hu Peng, Li Jin-sheng, Hong Pei-lin. Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1310-1314.
Liu Li, Hu Peng, Li Jin-sheng, Hong Pei-lin. Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1310-1314.
Citation:
Liu Li, Hu Peng, Li Jin-sheng, Hong Pei-lin. Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1310-1314.
As emergence of several access methods, many LANs use access of dynamic IP address. Virtual Private Network(VPN)of static configuration is not applicable. Thus, how to exchange information, construct VPN in dynamic network is indicated as new question for research. A secure and dynamic tunneling mechanism is presented. And message of this mechanism is defined. This mechanism can solve above mentioned issue. Authentication and anti-replay function are introduced to avoid secure problems. The result of experiment shows that this mechanism can construct VPN securely and efficiently in dynamic network.
Venkateswaran R. Virtual private networks. IEEE Potentials,2001, 20(1): 11 - 15.[2]Huan Liang, Kabranov O, et al.. Minimal cost design of virtual private networks. Proceeding of the 2002 IEEE Canadian Conference on Electrical and Computer Engineering, 2002, vol.3:1610- 1615.[3]Anerousis N. Dynamic virtual network dimensioning in cost-sensitive environments[J].Global Telecommunications Conference, 1999. GLOBECOM 9.1999, vol.2:1511-[4]Metz C. The latest in virtual private networks: part Ⅰ[J].IEEE Internet Computing Magazine.2003, 7(1 ):87-[5]Ramanujan R, Kaddoura M, et al.. VPNshield: protecing VPN services from denial-of-service (DoS) attacks[J].DARPA Information Survivability Conference and Exposition, 2003,Proceedings.2003, vol2:138-