Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1275
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tennekoon, R | - |
dc.contributor.author | Wijekoon, J | - |
dc.contributor.author | Nishi, H | - |
dc.date.accessioned | 2022-02-18T09:53:37Z | - |
dc.date.available | 2022-02-18T09:53:37Z | - |
dc.date.issued | 2018-11-20 | - |
dc.identifier.citation | R. Tennekoon, J. Wijekoon and H. Nishi, "On the Effectiveness of IP-Routable Entire-Packet Encryption Service Over Public Networks (November 2018)," in IEEE Access, vol. 6, pp. 73170-73179, 2018, doi: 10.1109/ACCESS.2018.2882390. | en_US |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1275 | - |
dc.description.abstract | The Internet is an unsecured public network accessed by approximately half of the world population. There are several techniques, such as cryptography, end-to-end encryption, and tunneling, used to preserve data security and integrity and to reduce information theft. This is because the security of data transmission over public networks is an ever-questionable issue. However, none of the above techniques are capable of providing the flexibility of changing either the algorithm or its key at the intermediary routers according to the requirements of stakeholders, e.g., ISPs or Internet users. Although the transmitted data are encrypted and unreadable, the metadata contained in the packet headers are readable during traversal. Nonetheless, service-based Internet architectures, e.g., IoT architectures, demand the analysis the data streams at the intermediary routers to provide smart services such as strengthening the security of the data streams. To this end, this paper proposes a method to use service-oriented routers for providing secure data transmission by encrypting data packets including the header and trailer information. A prototype of the proposed method is implemented on the ns-3 simulator, and this paper discusses the implementation notes and evaluation of the test results. The test results demonstrate that there is only an average processing cost of 180.14/191.35, 213.96/257.41, 157.56/170.68, and 235.48/ 249.49 μs for encrypting the total encrypted combined packets/total encrypted separate packets using IDEA, DES, AES-GCM, and AES-CTR encryption algorithms, respectively, with a 256-bit key space. This is significantly lower than the tolerable transmission delay (150 ms) defined by the ITU-T. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | IEEE Access;Vol 6 Pages 73170-73179 | - |
dc.subject | Effectiveness | en_US |
dc.subject | IP-Routable | en_US |
dc.subject | Entire-Packet | en_US |
dc.subject | Encryption Service | en_US |
dc.subject | Public Networks | en_US |
dc.title | On the effectiveness of IP-routable entire-packet encryption service over public networks (november 2018) | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ACCESS.2018.2882390 | en_US |
Appears in Collections: | Research Papers - Dept of Computer Systems Engineering Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
On_the_Effectiveness_of_IP-Routable_Entire-Packet_Encryption_Service_Over_Public_Networks_November_2018.pdf Until 2050-12-31 | 8.85 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.