The Research and Design for IPSec Protocol Based on Embedded Linux OS over IPv6

Article Preview

Abstract:

The paper analyzes the principle and key technique of IPSec protocol, researches the security policy and processing flow of IPSec, presents the design ideal and implementation scheme of IPSec based on embedded Linux Operation System. The realization of IPSec mainly consists of five modules. In addition, every module function is discussed in detail.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1111-1115

Citation:

Online since:

August 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC2401, (1998).

Google Scholar

[2] S. Kent, R. Atkinson, IP Authentication Header (AH), RFC2402, (1999).

Google Scholar

[3] S. Kent, R. Atkinson, IP Encapsulating Security Payload (ESP), RFC2406, (1998).

DOI: 10.17487/rfc2406

Google Scholar

[4] D. Harkins, D. Carrel, The Internet Key Exchange, RFC2409, (1998).

Google Scholar

[5] Charlie Kaufman, Internet Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2-14, (2004).

DOI: 10.17487/rfc4306

Google Scholar

[6] D. Piper , The Internet IP Security Domain of Interpretation for ISAKMP, RFC2407, (1998).

DOI: 10.17487/rfc2407

Google Scholar

[7] D. Maughham, M. Schertler, etc. Internet Security Association and Key Management Protocol (ISAKMP), RFC2408, (1998).

DOI: 10.17487/rfc2408

Google Scholar

[8] C. Metz, B. Phan, PF_KEY Key Management API, Version 2, RFC2367, (1998).

Google Scholar