Comparative analysis of VPN protocols
Comparative analysis of VPN protocols
Jerzy Antoniuk
antoniukjurek@gmail.comPolitechnika Lubelska (Poland)
Małgorzata Plechawska-Wójcik
Lublin University of Technology (Poland)
Abstract
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. The Docker applications were used for the tests, on which the VPN server configuration file was launched. The containers were running on the Amazon server. The tests were performed on a laptop and a virtual machine with Windows 10 Pro. The virtual machine has been run in the Microsoft Azure cloud. The next step was to launch three docker containers and start performance tests using three tools: ping command, Speedtest-cli and Iperf3. The result of the research is the analysis of the measurement results and drawing conclusions.
Keywords:
computer network; cloud computing; virtual private networkReferences
B. Hoekstra, D. Musulin, J. J. Keijser, Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN, Universiteit Van Amsterdam, System & Network Engineering, Amsterdam (2011) 2010-2011.
Google Scholar
C. A. Shue, M. Gupta, S. A. Myers, Ipsec: Performance analysis and enhancements, IEEE International Conference on Communications (2007) 1527-1532.
DOI: https://doi.org/10.1109/ICC.2007.256
Google Scholar
S. Y. Ammen., S. W. Nourildean, Firewall and VPN investigation on cloud computing performance, International Journal of Computer Science and Engineering Survey 5.2 (2014) 15.
DOI: https://doi.org/10.5121/ijcses.2014.5202
Google Scholar
M. Aamir, M. Zaidi, H. Mansoor, Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET, arXiv preprint rXiv:1206.5469 (2012).
Google Scholar
M. Sabbagh, A. Anbarje, Evaluation of WireGuard and OpenVPN VPN solutions, 2020.
Google Scholar
P. Dymora, M. Mazurek, T. Pilecki, Performance Analysis of VPN Remote Access Tunnels, Annales Universitatis Mariae Curie-Sklodowska sectio AI–Informatica 14.3 (2014) 53-64.
DOI: https://doi.org/10.2478/umcsinfo-2014-0014
Google Scholar
S. Ullah, J. Choi, H. Oh, IPsec for high speed network links: Performance analysis and enhancements, Future Generation Computer Systems 107 (2020) 112-125.
DOI: https://doi.org/10.1016/j.future.2020.01.049
Google Scholar
M. Pudelko, P. Emmerich, S. Gallenmüller, G. Carle, Performance Analysis of VPN Gateways, IFIP Networking Conference (Networking) (2020) 325-333.
Google Scholar
D. Taneja, S. S. Tyagi, Factors Impacting the Performance of Data Transferred Via VPN, International Journal of Innovative Technology and Exploring Engineering 8 (2019) 2962-2966.
DOI: https://doi.org/10.35940/ijitee.K2087.1081219
Google Scholar
I. Coonjah, P. Clarel Catherine, K. M. S. Soyjaudah, Experimental performance comparison between TCP vs UDP tunnel using OpenVPN, 2015, International Conference on Computing Communication and Security IEEE (2015) 1-5.
DOI: https://doi.org/10.1109/CCCS.2015.7374133
Google Scholar
M. Sakib, J. Singh. Simulation Based Performance Analysis of IPSec VPN over IPv6 Networks, International Journal of Electronics and Information Engineering 12.2 (2020) 92-104.
Google Scholar
S. Mackey, I, Mihov, Alex Nosenko, F. Vega, Y. Cheng, A Performance Comparison of WireGuard and OpenVPN, Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (2020) 162-164.
DOI: https://doi.org/10.1145/3374664.3379532
Google Scholar
E. Danilova, Comparing the performance of different VPN technologies with TLS/SSL, 2015.
Google Scholar
K. S. Munasinghe, VPN over a wireless infrastructure: evaluation and performance analysis. Diss, University of Western Sydney, 2005.
Google Scholar
I. Kotuliak, P. Rybár, P. Trúchly, Performance comparison of IPsec and TLS based VPN technologies, 9th International Conference on Emerging eLearning Technologies and Applications IEEE (2011) 217-221.
DOI: https://doi.org/10.1109/ICETA.2011.6112567
Google Scholar
J. Ronan, S. Davy, J. Rossebo, An Analysis of IPsec Deployment Performance in High and Low Power Devices, (2004).
Google Scholar
R. Munadi, D. D. Sanjoyo, D. Perdana, F. Adjie, Performance analysis of tunnel broker through open virtual private network, Telkomnika 17.3 (2019) 1185-1192.
DOI: https://doi.org/10.12928/telkomnika.v17i3.12231
Google Scholar
S. Padhiar, Sneha, P. Verma, A Survey on Performance Evaluation of VPN, International Journal of Engineering Development and Research 3.4 (2015) 516-519.
Google Scholar
R. Malik, R. Syal, Performance analysis of ip security vpn, International Journal of Computer Applications 8.4 (2010) 0975.
DOI: https://doi.org/10.5120/1202-1393
Google Scholar
N. Lewis, Memory forensics and the windows subsystem for linux, Digital Investigation 26 (2018) S3-S11.
DOI: https://doi.org/10.1016/j.diin.2018.04.018
Google Scholar
Authors
Małgorzata Plechawska-WójcikLublin University of Technology Poland
Statistics
Abstract views: 524PDF downloads: 481
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.