This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science
Author
Prashant P. Pittalia
Org/Univ
Sardar Patel University, Anand, Gujarat, India
Keywords
IPSec, Transport mode, Tunnel mode, Authentication, Encapsulation
Citations
IEEE
Prashant P. Pittalia. Internet Protocol Security (IPSec) for authentication and confidentiality at network layer, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Prashant P. Pittalia (2019). Internet Protocol Security (IPSec) for authentication and confidentiality at network layer. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Prashant P. Pittalia. "Internet Protocol Security (IPSec) for authentication and confidentiality at network layer." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Prashant P. Pittalia. Internet Protocol Security (IPSec) for authentication and confidentiality at network layer, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Prashant P. Pittalia (2019). Internet Protocol Security (IPSec) for authentication and confidentiality at network layer. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Prashant P. Pittalia. "Internet Protocol Security (IPSec) for authentication and confidentiality at network layer." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Abstract
In internet IPv4 and IPv6 protocols are at the network layer. To exchange the packet at the network layer with security aspects IPSec is used. IPSec uses to transport and tunnel mode for secure communication between the two devices. Transport mode kept the packet header as it is but encrypts the data while in tunnel mode one packet is kept in another packet for the confidentiality of the message. IPSec works to protect the data flow in host-to-host, network-to-network, and network-to-host as well. Here the paper describes the IPSec policy. In this paper, we discuss at network layer how security architecture used for protecting the secrecy and integrity of Internet traffic.