Academic Journals Database
Disseminating quality controlled scientific knowledge

A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols

Author(s): Gabriel Popescu

Journal: Journal of Mobile, Embedded and Distributed Systems
ISSN 2067-4074

Volume: 2;
Issue: 2;
Start page: 91;
Date: 2010;
Original page

Keywords: security | protocol | tunnel | cryptography | algorithm | virtual private network | analysis

In this paper, a comparative analysis of the major modern tunneling protocols used for  secure virtual private network implementations based on the Internet infrastructure will be elaborated.  The purpose of the paper is to help specialists to choose proper protocols for the specific practical implementations. The need for virtual private networks is explained as an introduction. The technical considerations are iterated, and a full classification of all types of virtual private networks is made, by providing the criteria used. The major tunneling protocols of interest and their advantages and disadvantages are described next. The comparative analysis is presented as a table showing the relevant characteristics of each tunneling protocol. Finally, real world best practices of the tunneling protocols iterated are shown as a conclusion.
Affiliate Program      Why do you need a reservation system?