SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 319
VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK
SECURITY
Ekwe O. A1
, Iroegbu C2
1
Department of Electrical/Electronics Engineering, Mouau, Abia, Nigeria
2
Department of Electrical/Electronics Engineering, Mouau, Abia, Nigeria
Abstract
Due to the increase demand nowadays to connect to internal networks from distant locations, the important of establishing secure
links across the network cannot be overemphasized. Employees often need to connect to internal private networks over the Internet
which is by nature insecure, thus, security becomes a major consideration. This research is on the implementation of Virtual Private
Network (VPN). Virtual Private Network(VPN) technology provides a way of protecting information being transmitted over the
Internet, by allowing users to establish a virtual private to securely enter an internal network, accessing resources, data and
communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely:
encryption, encapsulation, authorization, authentication, accounting, and spoofing.
Keywords: Virtual Private Network, Authorization, Authentication, Encryption, Internet.
----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
As the Internet became more and more accessible and
bandwidth capacities grew, companies began to put their
Intranets onto the web and create what are now known as
Extranets to link internal and external users [1]. However, as
cost-effective and quick-to-deploy as the Internet is, there is
one fundamental problem – security. But today, Virtual
Private Network (VPN) has overcome the security factor in
the network using special tunneling protocols and complex
encryption procedures, data integrity and privacy is achieved,
and the new connection produces what seems to be a
dedicated point-to point connection [2].
Virtual Private Network (VPN) is a generic term used to
describe a communication network that uses any combination
of technologies to secure a connection tunnelled through an
otherwise unsecured or untrusted network. It uses public
network paths but maintains the security and protection of
private networks. Instead of using a dedicated connection,
such as leased line, a "virtual" connection is made between
geographically dispersed users and networks over a shared or
public network, like the Internet. Data is transmitted as if it
were passing through private connections [3].
Virtual Private Network employs encryption, encapsulation,
authentication, authorization, and firewalls among other
techniques. VPN has become the defacto standard for secure
Internet communications, providing traffic integrity,
confidentiality and authentication
2. BACKGROUND INFORMATION
As enterprises dabbled in e-commerce, it became clear that the
internet was the practical and cost effective way to connect
with customers and partners. The concept of connecting with
external users came to be known as extranet. The internet
began as a concept in 1964, when the Rand Corporation of
USA introduced the idea of Packet Switching Network (PSN).
A PSN divides a message into packets of fixed size and routes
them to the destination [5]. An example of this is the X.25
network.
The physical implementation of the internet began in 1969
with a four-node network called the ARPANET, a project
funded by Advanced Research Project Agency (ARPA) of the
U.S Department of Defense. In 1984, the ARPANET was
shutdown but the remaining nodes and subnets connected to
the network of computer world-wide remained, thus causing
the internet to become a public network. And since it is a
public network, there is no security on it [6].
One of the ways to achieve the needed security is the
implementation of the Virtual Private Network, which
employs encryption, encapsulation, authentication,
authorization, and firewalls among other techniques to ward-
off intruders by blocking or disallowing all traffic except
messages from designated places or for a designated type (as
in firewall) using a router[7].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 320
3. DESIGN METHODOLOGY, SIMULATION AND
TESTING
Figure 1 shows a generalized Model of a VPN.
Fig-1: A VPN Model [3]
Figure 2 illustrates how to set up a VPN Tunnel between
Gateways
Fig-2: Setting Up a VPN Tunnel between Gateways
Figure 3 shows an X.25 Network model similar to one on
which the data to be secured by this research runs.
Fig-3: X25 Network Model
X.25 is an ITU-T protocol standard model for WAN
communications designed to operate effectively regardless of
the type of systems connected to the network and used in the
public switched networks (PSNs) of common carriers, such as
the telephone companies [6]. Its devices fall into three
categories: Data Circuit-terminating Equipment (DCE), Data
Terminal Equipment (DTE), and Packet-Switching Exchanges
(PSE). The VPN encryption program developed in this
research was installed on the DTE at both ends (i.e. sender and
receiver‟s personal computers). Data circuit-terminating
equipments are communications devices, such as modems and
packet switches that provide the interface between data
terminal equipment devices and packet-switching exchanges,
and are generally located in the carrier‟s facilities Packet-
switching exchanges are switches that compose the bulk of the
carrier‟s network. They transfer data from one DTE device to
another through the X.25 public switched network.
3.1 The Flowchart for the VPN Implementation
Figure 4 shows the flowchart for the VPN implementation.
Fig-4: Flowchart of VPN implementation.
The message to be encrypted was juggled in such a way that
the character at every sixth count in the message was used in
conjunction with every second character in the ASCII count to
form an encrypted version of the message. The design could
take as much as 256 different input characters in the message
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 321
construction. The decryption process involved the reversal of
the encryption process.
3.2 Symmetrical or Private Keys
The same key was used both to encrypt and to decrypt
information, hence called a symmetrical key. This is the
method adopted in this work. Symmetrical keys require users
of a VPN to share the same key at each end of the connection.
Because the key is shared, symmetrical keys are frequently
referred to as shared secrets. Symmetric key encryption has a
single key that is used by both communication partners. Figure
5 shows a symmetric key encryption and decryption method.
 When party A sends to party B, party A encrypts with
the single symmetric key and party b decrypts with the
same key.
 When party B transmits to party A, in turn party B
encrypts with the single symmetric key and also party
A decrypts with the same key.
Fig -5: Symmetric key encryption and decryption [8]
3.3 Authentication
Authentication proves the sender‟s identity. If we get a
message claiming to be from someone, we want to be certain
that it is not really coming from someone else; we apply the
concept of authentication. A common technique for
authentication is for each side to “challenge” the other side by
sending a random number. The challenger decrypted the
returned value and if the decrypted value matched the original
random number, the challenged party was treated as authentic.
There are many forms of authentication; passwords
authentication, authentication card, biometric authentication
etc.
3.4 Authorization
Authorization allows the network to permit or deny a person
access to a particular database or services.
4. RESULT ANAYSIS AND DISCUSSIONS
The result of a sample obtained from the Virtual Private
Network implementation is shown in Figure 6 below.
Fig-6: Result obtained from the implementation of Virtual
Private Network
The program challenged a user to provide user name and
password for authentication and authorization purposes. To
maintain responsibility for message validity, the recipient of
the message would need to decrypt the document using the
sender‟s private key. If the encryption codes are the same
when compared, the message is decrypted. After a total of
three unsuccessful trials, the intending user is completely
logged out and the VPN system platform is automatically
exited, while for a successful login, the VPN main window
menu is displayed, availing the user the opportunity to:
 Compose a message
 Checking his mail
 Create and delete user accounts
 Change user‟s passwords
 Exit the window.
5. CONCLUSIONS
Since the Internet offers no security for the data sent across it,
the need of establishing a secure links across the network
becomes inestimable. VPN provides a means of accessing a
secure, private, internal network over insecure public networks
such as the Internet. To achieve data security on the Internet,
a combination of techniques namely: encryption,
encapsulation, authorization, authentication, accounting, and
spoofing were implemented in the Virtual Private Network.
REFERENCES
[1]. Ryan, Jerry. 2001. “A Practical Guide to the Right VPN
Solution”. The Applied Technologies Group. pp.5, 20, 21.
[2]. AXENT Technologies, Inc. 1998. “Everything You Need
to Know AboutNetwork Security. Pg21.
[3].http://cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.h
tm
[4]. Chapman, D.B. and Zwicky, E.D. Building Internet
Firewall, O‟ Reilly &
Associates, Sebastopol, C.A, 1995
[5]. CISCO. 2000. “Internetworking Technologies
Handbook.” pp. 1-2.
[6]. BNET. 2006. Louisville, KY. http://www.techguide.com
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 322
[7]. AXENT Technologies, Inc. 1998. “Everything You Need
to Know About Network Security.
[8]. Aru, O., Iroegbu C., and Enyenihi, H., „„Analysis of Data
Security Approach for Digital Computers‟‟. International
Journal of Modern Engineering Research, Vol. 3, Issue. 6,
Nov - Dec. 2013 pp-3449-3451
BIOGRAPHIES
Engr. Ogbonna A. Ekwe is a highly motivated Electronic
Engineer with a bias in Communications. He obtained his
Bachelor of Engineering (B.Eng.) degree in Electronics
Engineering at the University of Nigeria, Nsukka in 2005, and
a Master‟s Degree in Electronic Communications and
Computer Engineering from University of Nottingham, United
Kingdom in 2011. He possesses many years of experience in
different work environments with excellent team leadership
qualities. Engr. Ekwe, O. A is presently lecturing in the
department of Electrical/Electronic Engineering, Michael
Okpara University of Agriculture, Umudike, Abia State,
Nigeria. His research interest are in the areas of Interference
management for cellular communication, Communication
techniques for next generation cellular systems, Channel
fading mitigation for fixed and mobile wireless
communication systems, etc.
Iroegbu Chibuisi received his B.Eng. degree in Electrical and
Electronics Engineering from Michael Okpara University of
Agriculture, (MOUAU) Umudike, Abia State Nigeria in 2010,
and currently doing a Master of Engineering degree in
Electronics and Communication Engineering, Michael Okpara
University of Agriculture, (MOUAU) Umudike, Abia State
Nigeria. He is a member of International Association of
Engineers. His research interests are in the fields of wireless
sensor networks, Electronic and Communication Systems
design, Security system design, Expert systems and Artificial
Intelligence, Design of Microcontroller based systems,
Channel coding etc

More Related Content

PDF
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
PDF
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
PDF
Vtu network security(10 ec832) unit 3 notes.
PDF
Vtu network security(10 ec832) unit 5 notes.
PDF
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
Network and cyber security module(15ec835, 17ec835)
PDF
VTU network security(10 ec832) unit 6 notes
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 5 notes.
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Vtu network security(10 ec832) unit 2 notes..
Network and cyber security module(15ec835, 17ec835)
VTU network security(10 ec832) unit 6 notes

What's hot (20)

PDF
Vtu network security(10 ec832) unit 1 notes
PDF
Network security 10EC832 vtu notes
PDF
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
PDF
A Review on Various Methods of Cryptography for Cyber Security
PDF
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
PDF
Ijarcet vol-2-issue-4-1322-1329
PDF
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
PDF
Low-cost wireless mesh communications based on openWRT and voice over interne...
PDF
Framework for wireless network security using quantum cryptography
PPTX
Virtual private network
PDF
A novel paradigm in authentication system
PDF
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
DOC
Social Engg. Assignment it17 final (1)
PDF
Cn36539543
PDF
H0362052056
PDF
Enhanced security in spontaneous wireless ad hoc
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
IPv6 Implementation challenges
PDF
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
Vtu network security(10 ec832) unit 1 notes
Network security 10EC832 vtu notes
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
A Review on Various Methods of Cryptography for Cyber Security
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
Ijarcet vol-2-issue-4-1322-1329
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Low-cost wireless mesh communications based on openWRT and voice over interne...
Framework for wireless network security using quantum cryptography
Virtual private network
A novel paradigm in authentication system
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
Social Engg. Assignment it17 final (1)
Cn36539543
H0362052056
Enhanced security in spontaneous wireless ad hoc
International Journal of Engineering Research and Development (IJERD)
IPv6 Implementation challenges
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
Ad

Viewers also liked (20)

PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PDF
Experimental study of the forces above and under the vibration insulators of ...
PDF
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...
PDF
Gis in assessing topographical aspects of hilly regions
PDF
Available transfer capability computations in the indian southern e.h.v power...
PDF
Rate adaptive resource allocation in ofdma using bees algorithm
PDF
Proposed aes for image steganography in different medias
PDF
Rfid, an enabler in supply chain management
PDF
An enhanced fuzzy rough set based clustering algorithm for categorical data
PDF
Lake sediment thickness estimation using ground penetrating radar
PDF
A survey on clustering techniques for identification of
PDF
A survey on fem modelling for composites
PDF
A vivacious approach to detect and prevent d do s attack
PDF
3 d mrf based video tracking in the compressed domain
PDF
Geographical routing protocols for mobile ad hoc
PDF
Vlsi implementation of adaptive kalman filter for
PDF
Zigbee based smart fall detection and notification
PDF
Evaluation of interaction energies and thermodynamic
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
Dynamic model of zeta converter with full state
Analysis of image steganalysis techniques to defend against statistical attac...
Experimental study of the forces above and under the vibration insulators of ...
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...
Gis in assessing topographical aspects of hilly regions
Available transfer capability computations in the indian southern e.h.v power...
Rate adaptive resource allocation in ofdma using bees algorithm
Proposed aes for image steganography in different medias
Rfid, an enabler in supply chain management
An enhanced fuzzy rough set based clustering algorithm for categorical data
Lake sediment thickness estimation using ground penetrating radar
A survey on clustering techniques for identification of
A survey on fem modelling for composites
A vivacious approach to detect and prevent d do s attack
3 d mrf based video tracking in the compressed domain
Geographical routing protocols for mobile ad hoc
Vlsi implementation of adaptive kalman filter for
Zigbee based smart fall detection and notification
Evaluation of interaction energies and thermodynamic
Malicious attack detection and prevention in ad hoc network based on real tim...
Dynamic model of zeta converter with full state
Ad

Similar to Virtual private network a veritable tool for network security (20)

PDF
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
PDF
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
DOC
Virtual private network
PDF
Lan Virtual Networks
PDF
IRJET - Site to Site Open VPN
PDF
Firewall and vpn investigation on cloud computing performance
PDF
Security Issues Of Virtual Private Networks: A Survey
PPTX
Virtual Private Network- VPN
PDF
Securing the cloud computing systems with matrix vector and multi-key using l...
PDF
IRJET- A Survey of Working on Virtual Private Networks
DOCX
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
PPTX
DOC
Virtual private network
PDF
Virtual private networks
PPTX
Virtual Private Network VPN
PDF
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
PDF
A depth detail about vpn security
PPTX
Vpn-Virtual Private Network
PPTX
Virtual Private Network
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Virtual private network
Lan Virtual Networks
IRJET - Site to Site Open VPN
Firewall and vpn investigation on cloud computing performance
Security Issues Of Virtual Private Networks: A Survey
Virtual Private Network- VPN
Securing the cloud computing systems with matrix vector and multi-key using l...
IRJET- A Survey of Working on Virtual Private Networks
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Virtual private network
Virtual private networks
Virtual Private Network VPN
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
A depth detail about vpn security
Vpn-Virtual Private Network
Virtual Private Network

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Well-logging-methods_new................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Mechanical Engineering MATERIALS Selection
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Automation-in-Manufacturing-Chapter-Introduction.pdf
573137875-Attendance-Management-System-original
Lecture Notes Electrical Wiring System Components
Internet of Things (IOT) - A guide to understanding
R24 SURVEYING LAB MANUAL for civil enggi
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT 4 Total Quality Management .pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
bas. eng. economics group 4 presentation 1.pptx
Well-logging-methods_new................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mechanical Engineering MATERIALS Selection

Virtual private network a veritable tool for network security

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 319 VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY Ekwe O. A1 , Iroegbu C2 1 Department of Electrical/Electronics Engineering, Mouau, Abia, Nigeria 2 Department of Electrical/Electronics Engineering, Mouau, Abia, Nigeria Abstract Due to the increase demand nowadays to connect to internal networks from distant locations, the important of establishing secure links across the network cannot be overemphasized. Employees often need to connect to internal private networks over the Internet which is by nature insecure, thus, security becomes a major consideration. This research is on the implementation of Virtual Private Network (VPN). Virtual Private Network(VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing. Keywords: Virtual Private Network, Authorization, Authentication, Encryption, Internet. ----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION As the Internet became more and more accessible and bandwidth capacities grew, companies began to put their Intranets onto the web and create what are now known as Extranets to link internal and external users [1]. However, as cost-effective and quick-to-deploy as the Internet is, there is one fundamental problem – security. But today, Virtual Private Network (VPN) has overcome the security factor in the network using special tunneling protocols and complex encryption procedures, data integrity and privacy is achieved, and the new connection produces what seems to be a dedicated point-to point connection [2]. Virtual Private Network (VPN) is a generic term used to describe a communication network that uses any combination of technologies to secure a connection tunnelled through an otherwise unsecured or untrusted network. It uses public network paths but maintains the security and protection of private networks. Instead of using a dedicated connection, such as leased line, a "virtual" connection is made between geographically dispersed users and networks over a shared or public network, like the Internet. Data is transmitted as if it were passing through private connections [3]. Virtual Private Network employs encryption, encapsulation, authentication, authorization, and firewalls among other techniques. VPN has become the defacto standard for secure Internet communications, providing traffic integrity, confidentiality and authentication 2. BACKGROUND INFORMATION As enterprises dabbled in e-commerce, it became clear that the internet was the practical and cost effective way to connect with customers and partners. The concept of connecting with external users came to be known as extranet. The internet began as a concept in 1964, when the Rand Corporation of USA introduced the idea of Packet Switching Network (PSN). A PSN divides a message into packets of fixed size and routes them to the destination [5]. An example of this is the X.25 network. The physical implementation of the internet began in 1969 with a four-node network called the ARPANET, a project funded by Advanced Research Project Agency (ARPA) of the U.S Department of Defense. In 1984, the ARPANET was shutdown but the remaining nodes and subnets connected to the network of computer world-wide remained, thus causing the internet to become a public network. And since it is a public network, there is no security on it [6]. One of the ways to achieve the needed security is the implementation of the Virtual Private Network, which employs encryption, encapsulation, authentication, authorization, and firewalls among other techniques to ward- off intruders by blocking or disallowing all traffic except messages from designated places or for a designated type (as in firewall) using a router[7].
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 320 3. DESIGN METHODOLOGY, SIMULATION AND TESTING Figure 1 shows a generalized Model of a VPN. Fig-1: A VPN Model [3] Figure 2 illustrates how to set up a VPN Tunnel between Gateways Fig-2: Setting Up a VPN Tunnel between Gateways Figure 3 shows an X.25 Network model similar to one on which the data to be secured by this research runs. Fig-3: X25 Network Model X.25 is an ITU-T protocol standard model for WAN communications designed to operate effectively regardless of the type of systems connected to the network and used in the public switched networks (PSNs) of common carriers, such as the telephone companies [6]. Its devices fall into three categories: Data Circuit-terminating Equipment (DCE), Data Terminal Equipment (DTE), and Packet-Switching Exchanges (PSE). The VPN encryption program developed in this research was installed on the DTE at both ends (i.e. sender and receiver‟s personal computers). Data circuit-terminating equipments are communications devices, such as modems and packet switches that provide the interface between data terminal equipment devices and packet-switching exchanges, and are generally located in the carrier‟s facilities Packet- switching exchanges are switches that compose the bulk of the carrier‟s network. They transfer data from one DTE device to another through the X.25 public switched network. 3.1 The Flowchart for the VPN Implementation Figure 4 shows the flowchart for the VPN implementation. Fig-4: Flowchart of VPN implementation. The message to be encrypted was juggled in such a way that the character at every sixth count in the message was used in conjunction with every second character in the ASCII count to form an encrypted version of the message. The design could take as much as 256 different input characters in the message
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 321 construction. The decryption process involved the reversal of the encryption process. 3.2 Symmetrical or Private Keys The same key was used both to encrypt and to decrypt information, hence called a symmetrical key. This is the method adopted in this work. Symmetrical keys require users of a VPN to share the same key at each end of the connection. Because the key is shared, symmetrical keys are frequently referred to as shared secrets. Symmetric key encryption has a single key that is used by both communication partners. Figure 5 shows a symmetric key encryption and decryption method.  When party A sends to party B, party A encrypts with the single symmetric key and party b decrypts with the same key.  When party B transmits to party A, in turn party B encrypts with the single symmetric key and also party A decrypts with the same key. Fig -5: Symmetric key encryption and decryption [8] 3.3 Authentication Authentication proves the sender‟s identity. If we get a message claiming to be from someone, we want to be certain that it is not really coming from someone else; we apply the concept of authentication. A common technique for authentication is for each side to “challenge” the other side by sending a random number. The challenger decrypted the returned value and if the decrypted value matched the original random number, the challenged party was treated as authentic. There are many forms of authentication; passwords authentication, authentication card, biometric authentication etc. 3.4 Authorization Authorization allows the network to permit or deny a person access to a particular database or services. 4. RESULT ANAYSIS AND DISCUSSIONS The result of a sample obtained from the Virtual Private Network implementation is shown in Figure 6 below. Fig-6: Result obtained from the implementation of Virtual Private Network The program challenged a user to provide user name and password for authentication and authorization purposes. To maintain responsibility for message validity, the recipient of the message would need to decrypt the document using the sender‟s private key. If the encryption codes are the same when compared, the message is decrypted. After a total of three unsuccessful trials, the intending user is completely logged out and the VPN system platform is automatically exited, while for a successful login, the VPN main window menu is displayed, availing the user the opportunity to:  Compose a message  Checking his mail  Create and delete user accounts  Change user‟s passwords  Exit the window. 5. CONCLUSIONS Since the Internet offers no security for the data sent across it, the need of establishing a secure links across the network becomes inestimable. VPN provides a means of accessing a secure, private, internal network over insecure public networks such as the Internet. To achieve data security on the Internet, a combination of techniques namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing were implemented in the Virtual Private Network. REFERENCES [1]. Ryan, Jerry. 2001. “A Practical Guide to the Right VPN Solution”. The Applied Technologies Group. pp.5, 20, 21. [2]. AXENT Technologies, Inc. 1998. “Everything You Need to Know AboutNetwork Security. Pg21. [3].http://cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.h tm [4]. Chapman, D.B. and Zwicky, E.D. Building Internet Firewall, O‟ Reilly & Associates, Sebastopol, C.A, 1995 [5]. CISCO. 2000. “Internetworking Technologies Handbook.” pp. 1-2. [6]. BNET. 2006. Louisville, KY. http://www.techguide.com
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 322 [7]. AXENT Technologies, Inc. 1998. “Everything You Need to Know About Network Security. [8]. Aru, O., Iroegbu C., and Enyenihi, H., „„Analysis of Data Security Approach for Digital Computers‟‟. International Journal of Modern Engineering Research, Vol. 3, Issue. 6, Nov - Dec. 2013 pp-3449-3451 BIOGRAPHIES Engr. Ogbonna A. Ekwe is a highly motivated Electronic Engineer with a bias in Communications. He obtained his Bachelor of Engineering (B.Eng.) degree in Electronics Engineering at the University of Nigeria, Nsukka in 2005, and a Master‟s Degree in Electronic Communications and Computer Engineering from University of Nottingham, United Kingdom in 2011. He possesses many years of experience in different work environments with excellent team leadership qualities. Engr. Ekwe, O. A is presently lecturing in the department of Electrical/Electronic Engineering, Michael Okpara University of Agriculture, Umudike, Abia State, Nigeria. His research interest are in the areas of Interference management for cellular communication, Communication techniques for next generation cellular systems, Channel fading mitigation for fixed and mobile wireless communication systems, etc. Iroegbu Chibuisi received his B.Eng. degree in Electrical and Electronics Engineering from Michael Okpara University of Agriculture, (MOUAU) Umudike, Abia State Nigeria in 2010, and currently doing a Master of Engineering degree in Electronics and Communication Engineering, Michael Okpara University of Agriculture, (MOUAU) Umudike, Abia State Nigeria. He is a member of International Association of Engineers. His research interests are in the fields of wireless sensor networks, Electronic and Communication Systems design, Security system design, Expert systems and Artificial Intelligence, Design of Microcontroller based systems, Channel coding etc