Academic Field

Computer Science, Systems, and Security

Faculty Mentor Name

Jeff Baez

Presentation Type

Oral Presentation

Abstract

We are implementing IPSEC in a new way. We want to be able to communicate through tunnels which are created on a common network. This will benefit many companies, corporations, and businesses because they will be able to securely communicate data from their business without anyone outside the network spying or eavesdropping on their data. By using IPSEC, the packets being sent across the network are encrypted. In order to create secure tunnels, you must run a program to enter any IP addresses you would like to create tunnels with. You must then use a secure proxy server to connect to the internet outside the tunnels. Using these tunnels, users will be much more comfortable with sharing their data over the network because they have the power to control their privacy themselves through the tunnels rather than relying on someone else outside.

Keywords

encryption, tunnels, IPSEC, communication, network, secure

Start Date

10-4-2015 4:15 PM

End Date

10-4-2015 5:30 PM

Location

Hartwell Hall 221

Share

COinS
 
Apr 10th, 4:15 PM Apr 10th, 5:30 PM

Using Internet Protocol Security to Create Tunnels to Communicate Securely on a Network

Hartwell Hall 221

We are implementing IPSEC in a new way. We want to be able to communicate through tunnels which are created on a common network. This will benefit many companies, corporations, and businesses because they will be able to securely communicate data from their business without anyone outside the network spying or eavesdropping on their data. By using IPSEC, the packets being sent across the network are encrypted. In order to create secure tunnels, you must run a program to enter any IP addresses you would like to create tunnels with. You must then use a secure proxy server to connect to the internet outside the tunnels. Using these tunnels, users will be much more comfortable with sharing their data over the network because they have the power to control their privacy themselves through the tunnels rather than relying on someone else outside.