Geographically Secured SSL-VPN Using GPS

نویسندگان

  • Suresh Limkar
  • Dhiren Patel
چکیده

We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we show how the SSL VPN model can be extended to incorporate the notion of location. We show how this location information can be used to determine whether a subject has access to a given object. A novel improved VPN (Virtual Private Network) system based on geo-secured SSL (Secure Socket Layer) protocol is proposed to overwhelm the defects of traditional SSL VPN. It enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location. This system not only authenticates authorized user but also the location of the user KeywordsSSL, VPN, Geo-encryption, Location based security, GPS based encryption

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Limitations and Differences of using IPsec, TLS/SSL or SSH as VPN-solution

Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.

متن کامل

How Mature are Clientless SSL VPN

A Virtual Private Network (VPN) offers a secure connection over an insecure network such as the Internet. Driven by an ever expanding mobile workforce and by the need for a cheaper alternative to private leased lines, the security community responded with a variety of VPN solutions deployed in a diverse array of software and hardware. Traditional VPNs offer good netto-net (site-to-site) connect...

متن کامل

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

A Virtual Private Network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. This work examines and empirically evaluates the remote access VPNs, namely Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling P...

متن کامل

Secure VPN Based on Combination of L2TP and IPSec

This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data...

متن کامل

A method to Implement the Kerberos User Authentication and the secured Internet Service

This paper proposes a PKINIT_AS Kerberos V5 authentication system to use public key cryptography and a method to implement the gssapi_krb authentication method and secured Internet service using it in IPSec VPN

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010