Professional Documents
Culture Documents
Abstract
Due to the increase demand nowadays to connect to internal networks from distant locations, the important of establishing secure
links across the network cannot be overemphasized. Employees often need to connect to internal private networks over the Internet
which is by nature insecure, thus, security becomes a major consideration. This research is on the implementation of Virtual Private
Network (VPN). Virtual Private Network(VPN) technology provides a way of protecting information being transmitted over the
Internet, by allowing users to establish a virtual private to securely enter an internal network, accessing resources, data and
communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely:
encryption, encapsulation, authorization, authentication, accounting, and spoofing.
2. BACKGROUND INFORMATION
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org
319
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org
320
3.3 Authentication
Authentication proves the senders identity. If we get a
message claiming to be from someone, we want to be certain
that it is not really coming from someone else; we apply the
concept of authentication. A common technique for
authentication is for each side to challenge the other side by
sending a random number. The challenger decrypted the
returned value and if the decrypted value matched the original
random number, the challenged party was treated as authentic.
There are many forms of authentication; passwords
authentication, authentication card, biometric authentication
etc.
3.4 Authorization
Authorization allows the network to permit or deny a person
access to a particular database or services.
Compose a message
5. CONCLUSIONS
Since the Internet offers no security for the data sent across it,
the need of establishing a secure links across the network
becomes inestimable. VPN provides a means of accessing a
secure, private, internal network over insecure public networks
such as the Internet. To achieve data security on the Internet,
a combination of techniques namely: encryption,
encapsulation, authorization, authentication, accounting, and
spoofing were implemented in the Virtual Private Network.
REFERENCES
[1]. Ryan, Jerry. 2001. A Practical Guide to the Right VPN
Solution. The Applied Technologies Group. pp.5, 20, 21.
[2]. AXENT Technologies, Inc. 1998. Everything You Need
to Know AboutNetwork Security. Pg21.
[3].http://cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.h
tm
[4]. Chapman, D.B. and Zwicky, E.D. Building Internet
Firewall, O Reilly &
Associates, Sebastopol, C.A, 1995
[5]. CISCO. 2000.
Internetworking Technologies
Handbook. pp. 1-2.
[6]. BNET. 2006. Louisville, KY. http://www.techguide.com
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org
321
BIOGRAPHIES
Engr. Ogbonna A. Ekwe is a highly motivated Electronic
Engineer with a bias in Communications. He obtained his
Bachelor of Engineering (B.Eng.) degree in Electronics
Engineering at the University of Nigeria, Nsukka in 2005, and
a Masters Degree in Electronic Communications and
Computer Engineering from University of Nottingham, United
Kingdom in 2011. He possesses many years of experience in
different work environments with excellent team leadership
qualities. Engr. Ekwe, O. A is presently lecturing in the
department of Electrical/Electronic Engineering, Michael
Okpara University of Agriculture, Umudike, Abia State,
Nigeria. His research interest are in the areas of Interference
management for cellular communication, Communication
techniques for next generation cellular systems, Channel
fading mitigation for fixed and mobile wireless
communication systems, etc.
Iroegbu Chibuisi received his B.Eng. degree in Electrical and
Electronics Engineering from Michael Okpara University of
Agriculture, (MOUAU) Umudike, Abia State Nigeria in 2010,
and currently doing a Master of Engineering degree in
Electronics and Communication Engineering, Michael Okpara
University of Agriculture, (MOUAU) Umudike, Abia State
Nigeria. He is a member of International Association of
Engineers. His research interests are in the fields of wireless
sensor networks, Electronic and Communication Systems
design, Security system design, Expert systems and Artificial
Intelligence, Design of Microcontroller based systems,
Channel coding etc
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org
322