Abstract
According to the characteristic of IKEv2 key exchange mechanism, this paper is designed and realized the frame construction and the module constitution of IKEv2. Establishing the transform relations between the exchange states and the news operation, this research had determined the message handling step and the key exchange flow. It also produced the detailed elaboration to each function module concrete realization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ari Huttunen, UDP Encapsulation of IPsec Packets. http://www.faqs.org/rfcs/rfc3948.htm
Petersen, R.: Linux Technology Guinness, vol. 1. Mechanical industry press, Brussels (2002)
Davis, C.R.: IPsec: VPN Security Implementation, vol. 1. Tsinghua University Press, Beijing (2002)
Yonghe, L.: IP Based End to End Security Model of Communication Network Analysis and Design, vol. P1, pp. 3–10. Micro computer information, Beijing (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yang, X., Liu, J. (2015). The Implementation of IKEV2 for IPSec. In: Leung, V., Lai, R., Chen, M., Wan, J. (eds) Cloud Computing. CloudComp 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 142. Springer, Cham. https://doi.org/10.1007/978-3-319-16050-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-16050-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16049-8
Online ISBN: 978-3-319-16050-4
eBook Packages: Computer ScienceComputer Science (R0)