logo

Hybrid Security In Virtual Private Networks

   

Added on  2019-10-30

15 Pages3542 Words252 Views
Running head: HYBRID SECURITY IN VIRTUAL PRIVATE NETWORKSLiterature Review on Hybrid Security in Virtual Private NetworksName of the StudentName of the UniversityAuthor’s Note:

1HYBRID SECURITY IN VIRTUAL PRIVATE NETWORKSAbstractAims: The main aim of this literature review is to understand the basic concept of hybrid securityin virtual private network. The review helps to understand what are the problems in VPN andwhy biometric and ECC are better than other VPN securities. The review covers thetechnological combination of biometric systems with the help of ECC or Elliptic CurveCryptography. The following review provides a brief description about how biometric systemcan be combined with ECC to make it beneficial for the society.Methods: This research will provide a literature review about the security and privacy issues inVPN security. The review will conduct various ways and advantages of biometric and ECCsystem that are utilized to control and secure the confidentiality of a user. The methods used forthe combination of biometric and ECC in this review are palm vein technology, retinal patterns,finger prints recognition, face recognition and voice recognition. The descriptions of all thesemethods are provided below. Expected Findings and Contribution: The bulk amount of confidential data should be secured invarious ways. VPN is sometimes unable to secure the network. Biometric system is the easiestway for safety of such data. Cryptography is an approach of encoding a message into a ciphertext so that it is not read by any intruder and only the receiver is able to read it. The combinationof these two systems will be extremely helpful for the society and thus the issue related tohacking of data and false entry would be reduced. Therefore, this literature review will producesome changes in the network and security that will improve the biometric and elliptical curvecryptography or ECC.

2HYBRID SECURITY IN VIRTUAL PRIVATE NETWORKSTable of Contents1. Introduction..................................................................................................................................32. Review.........................................................................................................................................42.1 Field of Research...................................................................................................................42.2 Other Reviews.......................................................................................................................72.3 Current Best Solution..........................................................................................................103. Conclusion.................................................................................................................................114. References..................................................................................................................................13

3HYBRID SECURITY IN VIRTUAL PRIVATE NETWORKS1. IntroductionVPN is the technology by which information is protected from getting transmitted overthe Internet. The unique recognition approaches include finger print recognition, retinal patterns,palm vein technology, voice recognition and face recognition (Mahto & Yadav, 2013). Theseseveral metrics are related to the characteristics of human beings. This is a type of authenticationused needed for the organization for access control and identification. Elliptical curvecryptography is a sub part of public key cryptography that is done on the basis of the structure ofalgebra of the elliptic curves over the finite fields. It needs various smaller keys in comparison toall the non-ECC for providing security. In this literature review, the discussion is made on the topic that why biometric and ECCare better than other VPN security. They help to mitigate the security issues by using the uniquetechnologies. This paper will provide good methods to secure the confidential data and maintainthe confidentiality of an organization. This literature review will also discuss about theinnovative ways to utilize this system.The literature review does not provide any innovative recommendation about biometricsystem and elliptical curve cryptography. Rather, the review describes the existing besttechnologies of biometric and elliptical curve cryptography (Ramalho, Correia & Soares, 2012).Most of the sources provided in the following paper states about the advantages of biometric,ECC, and disadvantages of the other VPN securities.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and information Security
|13
|493
|75

Information Technology Assignment | Biometric Authentication Report
|10
|2249
|99