2017
DOI: 10.14445/22312803/ijctt-v50p105
|View full text |Cite
|
Sign up to set email alerts
|

The Role of SSL/TLS, IPsec & IKEv2 Protocols in Security of E-learning System’s Communications, A Study & Simulation Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Let us consider the general chart of authentication of a key generated by users А and В if there is a TA under conditions of attacks of an active eavesdropper Е Figure 2. The users communicate with TA, where they are preliminary authenticated using protocols that apply certificates, for example, protocols SSL/TLS or IPSec [23]. The users have integrated PUF blocks into their devices.…”
Section: Dh Authentication Protocol Using a Ta And Pufsmentioning
confidence: 99%
“…Let us consider the general chart of authentication of a key generated by users А and В if there is a TA under conditions of attacks of an active eavesdropper Е Figure 2. The users communicate with TA, where they are preliminary authenticated using protocols that apply certificates, for example, protocols SSL/TLS or IPSec [23]. The users have integrated PUF blocks into their devices.…”
Section: Dh Authentication Protocol Using a Ta And Pufsmentioning
confidence: 99%
“…4T EXP +7T SYM +29T h SR: Server Registration Phase, SA: Server Authentication Phase, UR: User Registration Phase, ULA: User Login and Authentication Phase, PC: Password Change Phase, RCA: Registration Center Authentication Phase Table 11: Comparison of execution times with considering (Zivi et al, 2017a), (Chuang and Chen, 2014) and (Chaudhry et al, 2016) for proposed model and other methods Models Execution times (Microsecond) Improvement of proposed method (%) Kim et al (2012) 20237.0 67.09 Yoon and Yoo (2013) 20237.0 67.09 Chuang and Chen (2014) 11357.9 −6.22 Mishra et al (2014) 11376.1 −6.07 Amin et al (2015) 35853 Kim et al, Yoon and Yoo, Chuang and Chen, Mishra et al and Amin et al models, five IKEv2 operations for acquiring the same result is considered. This five IKEv2 operation is for client side configuration: (1) request from the server for client side configuration, (2) respond from the user for applying this configuration, (3) sending configuration script or algorithm for receiving validation message, (4) sending system-level execution permission and (5) sending configuration result.…”
Section: Compare the Proposed Model With Other Models In Terms Of Thementioning
confidence: 99%
“…Also the IKEv2 task processing time choose from our previous research. This value is average of task processing time in 10%, 30% and 50% of background traffic in 3 states of evaluation (Zivi et al, 2017a) Also Table 9 shows the Security and functional features improvements in percent for proposed model in comparison to other models. To calculate the security percentage of each method, (second column of Table 9), considering 16 security components with a security percentage of 100 (proposed method), with assuming that the security components have an equal importance (Table 8), each security component has a 6.25% impact on overall security.…”
Section: Compare the Proposed Model With Other Models In Terms Of Thementioning
confidence: 99%
See 2 more Smart Citations