Smart City Tunneling
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133 | Views: 352

Research Paper | Electronics & Communication Engineering | India | Volume 7 Issue 3, March 2018 | Popularity: 6.8 / 10


     

Smart City Tunneling

Prof. Chanchal Dahat, Ankita Patil, Ayushi Shahu, Aakansha Kamble, Diksha Ganar, Neha Fulzele, Pranali Khankule


Abstract: Service providers today are constantly seeking to offer multiple services on a single common infrastructure. For instance, it is desirable some times to provide transport services transparently to data traffic encapsulated over different network layers. Tunneling is a technique for encapsulating a packet or frame within another packet of the same or a different network layer. One of the motivations for tunneling is bridging various heterogeneous networks that use different protocols for communication. Tunneling is also used for providing private and secure communications over a publicly shared network this article investigate the interactions between different tunneling technologies in order to provide end to-end virtual connectivity to end clients. Particularly, the article describe the technical details of the implementation of various layer 2 tunneling techniques in order to establish an end-to-end virtual connection service as a concatenation of services offered by the different network domains along the path between end users. Security is the most important factor to be considered while designing a network and lot of research has been done in this field. One of the most effective ways for granting secured access in an organization is use of VPN. VPN is a generic term used as a combination of network topologies/technologies to describe a communication network through the tunnel, otherwise unsecured or not trusted network. VPN transmits data by the means of tunnels. The most important principle in establishing security through VPN tunnel is by providing proper Authentication and data encryption. The proposed method provides advanced encryption and authentication by using MAC address as a key. Whenever a sender wants to send any data through tunnel after establishment of the connection, the MAC address of the receivers device is read by the encryption technique it use it as a key to encrypt data.


Keywords: VPN, Encryption, Authentication, Mac And Tunneling


Edition: Volume 7 Issue 3, March 2018


Pages: 1570 - 1573



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Prof. Chanchal Dahat, Ankita Patil, Ayushi Shahu, Aakansha Kamble, Diksha Ganar, Neha Fulzele, Pranali Khankule, "Smart City Tunneling", International Journal of Science and Research (IJSR), Volume 7 Issue 3, March 2018, pp. 1570-1573, https://www.ijsr.net/getabstract.php?paperid=ART2018742, DOI: https://www.doi.org/10.21275/ART2018742

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Electronics & Communication Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1881 - 1885

A Novel Method for Reversible Data Hiding in Encrypted Images

Amol Baban Chavan, Ashis A. Zanjade

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 97

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this Article

Downloads: 102

Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1774 - 1776

An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm

Vinay Kumar Soni, Prashant Puri Goswami

Share this Article
Top