CRITERIA FOR EVALUATING THE PERFORMANCE OF IKEv2 IMPLEMENTATION
BORIŠA JOVANOVIĆ Centre of applied mathematics and electronics, Belgrade, borisa.jovanovic@vs.rs
|
Abstract: Secure communications have a key role in future networks and applications. Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks. In this context IETF Internet Key Exchange (IKEv2) is the most promising protocol under permanent review. In this paper are defined the criteria for evaluating the performance of different implementations of IKEv2 protocolSecure communications have a key role in future networks and applications. Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks. In this context IETF Internet Key Exchange (IKEv2) is the most promising protocol under permanent review. In this paper are defined the criteria for evaluating the performance of different implementations of IKEv2 protocol.
|