Abstract
Most of VPN (Virtual Private Network) protect the information only through the public network. There is need to develop the various forms of VPN. Therefore, various types of VPN are going to be studied in the view of SCG (Secure Communication Group). In this paper, the problems of path-definition method and the area-definition method to construct SCG are analyzed, then possible models among VPNs based on SCG technology are reviewed. This paper proposed the hierarchical VPN based on SCG number that apply the area-definition method to the internet, and analyzed the characteristics of the proposed VPN model on the point of the authentication frequency and the number of management keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
KISA, “Secure VPN Standard between IP and Application (Plan)”, March 1999.
B. Gleeson, A. Lin, J. Heinanen, G. Armitage, A. Malis, “A Framework for IP Based Virtual Private Networks”, RFC 2764, February 2000.
P. Rapalus, “Issues and Trends: 1998 CSI/FBI Computer Crime and Security Survey”, CSI Press Release, March 1998.
A. Watanabe, S. Seno, Y. Koui, T. Ideguchi, M. Yabe, “Realization Method of Secure Communication Groups using Encryption”, Transactions of Information Processing Society of Japan V. 38 N. 4, April 1997.
A. Watanabe, T. Inada, T. Ideguchi, I. Sasase, “Proposal of Group Search Protocol Making Secure Communication Groups for Intranet”, ICC 2000, June 2000.
S. Kent, R. Atkinson, “Security Architecture for the Internet Protocol”, RFC 2401, November 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, CW., Nah, J., Jang, J., Han, C. (2002). Design and Analysis of Hierarchical VPN Based on SCG. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_41
Download citation
DOI: https://doi.org/10.1007/3-540-45801-8_41
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44255-4
Online ISBN: 978-3-540-45801-2
eBook Packages: Springer Book Archive