The Need for Internet Protocol Security in Data Communication

  • Dr. Umoh. Mfreke E. Department of Computer Science, Akwa Ibom State, Ikot Osurua, Ikot Ekpene, Nigeria
  • Thursday Sunday D. Department of Computer Science, Akwa Ibom State, Ikot Osurua, Ikot Ekpene, Nigeria
Keywords: Internet Protocol, Internet security, Virtual Private Network, Packets

Abstract

In the 21stt century with the rapid development in technology, many organizations depend on ICT for reliability and security of information to increase their performance and productivity. Internet Protocol Security (IPsec) is a suite of protocols and services that provide security for IP networks. It is a widely used virtual private network (VPN) technology. Early TCP/IP development did very little for ensuring the security of communication between peering devices. As networks evolved so did the need for greater protection of the data transmitted. IP packets lack effective security mechanisms and may be forged, stolen, or tampered with when being transmitted on an insecure public network, such as the Internet. Solutions for data protection were developed from which IPSec emerged as security architecture for the implementations of data confidentiality, integrity and availability. This paper is designed to give one the knowledge and skills to identify, mitigate and prevent malicious intrusion from the internet and guard against attackers.

References

1. Bellovin, Steven M. (1996). "Problem Areas for the IP Security Protocols" (PostScript). Proceedings of the Sixth Usenix Unix Security Symposium. San Jose, CA. pp. 1–16. Retrieved 2007-07-09.
2. Cremers, C. (2011) Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2, ESORICS 2011, published by Springer: "https://link.springer.com/chapter/10.1007/978-3-642-23822-2_18"
3. Dan M., Bao P., & Craig M.(July 1998) RFC 2367, PF_KEYv2 Key Management API, Deering, Steve E. (1993). "Draft SIPP Specification". IETF: 21.
4. Degabriele, J., Paterson, K. (2007). "Attacking the IPsec Standards in Encryption-only Configurations" (PDF). IEEE Symposium on Security and Privacy, IEEE Computer Society. Oakland, CA. pp. 335–349. Retrieved 2007-08-13.
5. Gilmore, John. "Network Encryption – history and patents". Archived from the original on 2014-09-03. Retrieved 2014-02-18.
6. Goodin, Dan (2016). "Confirmed: hacking tool leak came from "omnipotent" NSA-tied group". Ars Technica. Retrieved August 19, 2016.
7. Hamad, Mohammad; Prevelakis, Vassilis (2015). Implementation and performance evaluation of embedded IPsec in microkernel OS. 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE. doi:10.1109/wscnis.2015.7368294. ISBN 9781479999064. S2CID 16935000.
8. Harkins, D.; Carrel, D. (1998). The Internet Key Exchange (IKE). IETF. doi:10.17487/RFC2409. RFC 2409.
9. Hoffman, P. (2005). Cryptographic Suites for IPsec. IETF. doi:10.17487/RFC4308. RFC 4308.
10. http://web.mit.edu/network/isakmp/"
11. "https://www.usenix.org/legacy/publications/library/proceedings/sd96/atkinson.html"
12. "Implementation of IPSec Protocol - IEEE Conference Publication". doi:10.1109/ACCT.2012.64. S2CID 16526652.
13. Kent, S. (December 2005). IP Authentication Header. IETF. doi:10.17487/RFC4302. RFC 4302
14. Kent, S.; Atkinson, R. (November 1998). IP Encapsulating Security Payload (ESP). IETF. doi:10.17487/RFC2406. RFC 2406.
15. Peter Willis (2001). Carrier-Scale IP Networks: Designing and Operating Internet Networks. IET. p. 271. ISBN 9780852969823.
16. Peter Willis (2001). Carrier-Scale IP Networks: Designing and Operating Internet Networks. IET. p. 267. ISBN 9780852969823.
17. RFC 6434, "IPv6 Node Requirements", E. Jankiewicz, J. Loughney, T. Narten (December 2011)
18. Seo, K., Kent, S. (2005). "RFC4301: Security Architecture for the Internet Protocol". Network Working Group of the IETF: 4. The spelling "IPsec" is preferred and used throughout this and all related IPsec standards. All other capitalizations of IPsec [...] are deprecated.
19. Thayer, R.; Doraswamy, N.; Glenn, R. (1998). IP Security Document Roadmap. IETF. doi:10.17487/RFC2411. RFC 2411.
20. Thomas, M. (2001). Requirements for Kerberized Internet Negotiation of Keys. doi:10.17487/RFC3129. RFC 3129.
21. Thomson, I. (2016). "Cisco confirms two of the Shadow Brokers' 'NSA' vulns are real". The Register. Retrieved September 16, 2016.
22. W. Richard Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison Wesley, 1994, ISBN 0-201-63346-9.
23. William, S., & Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson Education India. p. 492-493
Published
2022-09-15
How to Cite
E., D. U. M., & D., T. S. (2022). The Need for Internet Protocol Security in Data Communication. International Journal of Human Computing Studies, 4(9), 1-11. https://doi.org/10.31149/ijhcs.v4i9.3464
Section
Articles