Third International Conference on Information Technology and Applications (ICITA'05)
DOI: 10.1109/icita.2005.8
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Analysis of Multilayer IP Security Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…However, these methods all appear to expose the connection to security threats [46]. An alternative is the use of multilayer IP security (ML-IPsec), which is a more flexible (though complex) solution [47], [48]. It divides the IP datagram into zones, with different protection schemes.…”
Section: Dtn Security a Internet Security Challenges When Using Pepsmentioning
confidence: 99%
“…However, these methods all appear to expose the connection to security threats [46]. An alternative is the use of multilayer IP security (ML-IPsec), which is a more flexible (though complex) solution [47], [48]. It divides the IP datagram into zones, with different protection schemes.…”
Section: Dtn Security a Internet Security Challenges When Using Pepsmentioning
confidence: 99%
“…LES reduces the added network overhead by constraining the number of encryption zones and the locations of those zones. Sing and Soh [23] address some of the complexity and overhead issues with Multilayer IPsec (ML-IPsec) [33]. They limit the number of encryption zones to three and define those zones based on semantic information.…”
Section: Discussionmentioning
confidence: 99%
“…In this final part, the client acknowledges the response of the server and they both establish a reliable connection [68] with which they will start the actual data transfer. Generally, the three messages transmitted by TCP to negotiate and start a TCP session are nicknamed SYN, SYN-ACK, and ACK for SYNchronize, SYNchronize-ACKnowledgement, and ACKnowledge respectively [69], [70]. The threemessage mechanism enables the transport layer to pass information back and forth to two communicating computers to negotiate the parameters of the connection before transmitting data.…”
Section: Tcp 3 Way Handshake Protocolmentioning
confidence: 99%