Font Size: a A A

Analysis And Implementation Of IKE Protocol

Posted on:2006-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:W G ChenFull Text:PDF
GTID:2168360155955290Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Internet has been the biggest informational network. It is applied tc many domain such as military affairs , scientific researches, entertainment, commerce and so on. With commercializing of Internet, many company's local area network join in Internet. But the lack of security service in Internet Protocol has limited the wider deployment of many applications such as E-Commerce and E-Business.There is an importance security issue. We can find the technology of VPN to solve the security issue. IPSec protocol suite is a general-purpose secure protocol for Internet. Tightly integrated with IP protocol, it can provide various secure services for traffic at the IP layer. Internet Key Exchange (IKE) is an important part of IPSec. It provides services of authentication, policy negotiation and key exchange.The thesis firstly introduces the development of VPN and compares the L2TP VPN with the IPSec VPN. On the base that IPSec protocol has been analyzed.Secondly the thesis provides in-depth analysis of IKE protocol, including the format of IKE messages, the mode and phase of IKE. We bring forward architecture with well-designed modules and facilities. The overall architecture, the modules, the main data structure and the flow will be discussed. Finally project is implemented under VxWorks.The thesis also analyses the Deny of Service attack and Man in Middle attack of IKE protocol, which helps us study IKE protocol in the future, discusses the expansion of functionalities and future development of IKE.
Keywords/Search Tags:IPSec VPN, IKE, SA, PF_KEY
PDF Full Text Request
Related items