• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong

    Thumbnail
    Share
    View fulltext online
    Bandwidth-IPSec Security Trade-off in IPv4 and IPv6 in Windows 7 Environment.pdf (341.9Kb)
    Date
    2013-11-12
    Citation:
    Kolahi, S. S., Cao, Y. R., and Chen, H. (2013). Bandwidth-IPSec Security Trade-off in IPv4 and IPv6 in Windows 7 Environment. Second International Conference on Future Generation Communication Technologies (IEEE FGCT 2013)(Ed.), December 12-14, London, UK
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3389
    Abstract
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 encryption systems for both IPv4 and IPv6 using Windows 7 and wireless network access. For the system studied, enabling IPSec results in approximately 60% (IPv4) and 48% (IPv6) less TCP throughput compared to open system. Among encryption mechanisms, 3DES-SHA provides the highest TCP bandwidth for IPv4, while 3DES-MD5 gives the best result for IPv6. We also provide the results for UDP.
    Keywords:
    IPv6, IPv4, Windows 7, computer security, IPSec protocol, network security
    ANZSRC Field of Research:
    080303 Computer System Security, 100503 Computer Communications Networks
    Copyright Holder:
    Institute of Electrical and Electronics Engineers (IEEE)

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [150]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    106
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga