Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Secure communications through virtual private networks

Daabaj, K. and Sigiuk, H. (2004) Secure communications through virtual private networks. In: 5th Symposium and Exhibition of Communications and Information Technology (CIT 2004), 10 - 12 October, Tripoli, Libya


We no longer have to communicate physically from one place to another to complete a set of tasks or to gather pieces of information. Everything can be done virtually with a mouse click on an online host. As more and more companies link up their corporate network to a public network (e.g. Internet), we are faced with an inevitable issue—information security. A Virtual Private Network or VPN is an evolving communication technology that has the capability to greatly enhance the 'out-of-office' business experience. It is possible for a secure connection to be established between two or more sites so that internal network resources can be shared between users. Furthermore, larger organizations can use VPN connectivity to provide a secure, relatively high-speed link between multiple sites, and at a fraction of the cost of the leased-line alternative. VPN's are established using standard public internet connections, either dial-up or preferably broadband connections. Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a network; rather, the question to ask is if security has been implemented properly and the interoperability with today’s network architecture. Although there are various ways to perform a secure network environment, but the most popular and the most progressive network security mechanism is Security Architecture for IP (IPSec), offered by IETF (Internet Engineering Task Force). In this paper, IPSec-VPN performance was evaluated using two different methodologies for generating traffic; measurements such as response time and throughput were conducted before and after applying IPSec-VPN.

Item Type: Conference Paper
Conference Website:
Item Control Page Item Control Page