Title :
IPSec overhead in wireline and wireless networks for Web and email applications
Author :
Hadjichristofi, George C. ; Davis, Nathaniel J., IV ; Midkiff, Scott F.
Author_Institution :
Bradley Dept. of Electr. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
Abstract :
This paper focuses on characterizing the overhead of IP security (IPSec) for email and Web applications using a set of test bed configurations. The different configurations are implemented using both wireline and wireless network links. The testing considers different combinations of authentication algorithms and authentication protocols. Authentication algorithms include Hashed Message Authentication Code-Message Digest 5 (HMAC-MD5) and Hashed Message Authentication Code-Secure Hash Algorithm 1 (HMAC-SHA1). Authentication protocols include Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols. Triple Digital Encryption Standard (3DES) is used for encryption. Overhead is examined for scenarios using no encryption and no authentication, authentication and no encryption, and authentication and encryption. A variety of different file sizes are considered when measuring the overhead The results present a thorough analysis of the overhead of different IPSec configurations and provide practical guidance for choosing the IPSec configuration needed in a network environment.
Keywords :
Internet; code standards; electronic mail; message authentication; protocols; radio networks; telecommunication security; telecommunication standards; transport protocols; 3DES; HMAC-MD5; HMAC-SHA1; Hashed Message Authentication Code-Message Digest 5; Hashed Message Authentication Code-Secure Hash Algorithm 1; IPSec overhead; Triple Digital Encryption Standard; Web applications; authentication algorithms; authentication header protocols; authentication protocols; email applications; encapsulating security payload protocols; file sizes; overhead measurement; test bed configurations; wireless networks; wireline networks; Application software; Authentication; Cryptography; Electronic mail; Electrostatic precipitators; Intelligent networks; Protocols; Security; Testing; Wireless networks;
Conference_Titel :
Performance, Computing, and Communications Conference, 2003. Conference Proceedings of the 2003 IEEE International
Print_ISBN :
0-7803-7893-8
DOI :
10.1109/PCCC.2003.1203741