skip to main content
10.1145/3575882.3575887acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3inaConference Proceedingsconference-collections
research-article

QoS Analysis of Site-to-Site VPN and Its Integration Potential for Securing Communication on Electric Vehicles

Authors Info & Claims
Published:27 February 2023Publication History

ABSTRACT

Today, one of the challenges and hot issues related to Electric Vehicles (EV) is communication security, especially in the exchange of sensitive information on EVs. Virtual Private Network (VPN) is present as an alternative for those who need a communication network with reliable connectivity and security. VPNs have different types of protocols, some of which are Point-to-Point Tunneling Protocol (PPTP) and Ethernet over IP (EoIP) combined with IPSec (EoIP/IPSec). The purpose of this study aimed to analyze and compare the Quality of Service (QoS) generated by PPTP and EoIP/IPSec, then see the potential for integration of the combination between EoIP and IPSec as an effort of securing communications on EVs. QoS measurements were carried out using the TIPHON standard whose parameters consist of delay, jitter, packet loss, and throughput, as well as additional parameters such as CPU consumption and network security review. Throughput testing on the VPN client side was also carried out. The results of this study indicate that the combination of EoIP and IPSec, both in terms of performance and security, is possible and has the potential to be integrated into EVs.

Skip Supplemental Material Section

Supplemental Material

References

  1. A. Bourass, S. Cherkaoui, dan L. Khoukhi, “Secure Communication Scheme for Electric Vehicles in the Smart Grid,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Des 2017, vol. 2018-Janua, no. Icd, hal. 1–5. doi: 10.1109/GLOCOM.2017.8254479.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Fraiji, L. Ben Azzouz, W. Trojet, dan L. A. Saidane, “Cyber security issues of Internet of electric vehicles,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2018, vol. 2018-April, hal. 1–6. doi: 10.1109/WCNC.2018.8377181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. S. U. Alam, S. Iqbal, M. Zulkernine, dan C. Liem, “Securing Vehicle ECU Communications and Stored Data,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Mei 2019, vol. 2019-May, hal. 1–6. doi: 10.1109/ICC.2019.8762043.Google ScholarGoogle ScholarCross RefCross Ref
  4. B. Ma , “An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP,” Sensors, vol. 22, no. 2, hal. 647, Jan 2022, doi: 10.3390/s22020647.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Sholihah, T. Rizaldi, dan I. Novianty, “Information and communication system technology with VPN site-to-site IPsec,” J. Phys. Conf. Ser., vol. 1193, no. 1, hal. 012012, Apr 2019, doi: 10.1088/1742-6596/1193/1/012012.Google ScholarGoogle Scholar
  6. T. E. Madhadi dan L. Y. Banowosari, “Analisis Perbandingan Performasi QoS VPN Encryption Protocol pada Jaringan Berbasis Hybrid Cloud,” J. Ilm. Komputasi, vol. 20, no. 1, hal. 69–82, Mar 2021, doi: 10.32409/jikstik.20.1.2695.Google ScholarGoogle Scholar
  7. M. H. M. Zaharuddin, R. A. Rahman, dan M. Kassim, “Technical Comparison Analysis of Encryption Algorithm on Site-to-Site IPSec VPN,” in 2010 International Conference on Computer Applications and Industrial Electronics, Des 2010, no. Iccaie, hal. 641–645. doi: 10.1109/ICCAIE.2010.5735013.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Jones, H. Wimmer, dan R. J. Haddad, “PPTP VPN: An Analysis of The Effects of a DDoS Attack,” in 2019 SoutheastCon, Apr 2019, vol. 2019-April, hal. 1–6. doi: 10.1109/SoutheastCon42311.2019.9020514.Google ScholarGoogle Scholar
  9. B. A. Widodo, “Analisis Quality of Service pemanfaatan Ethernet Over IP(EoIP) Tunnel di MikrotikRouterOS dengan Routing Protocol OSPF,” J. Informatics, Inf. Syst. Softw. Eng. Appl., vol. 1, no. 1, hal. 1–8, Sep 2018, doi: 10.20895/inista.v1i1.17.Google ScholarGoogle Scholar
  10. F. W. P. Dharma dan Suharjito, “Enhancing Branch Office Network Availability Using Cloud EoIP Gateway,” Procedia Comput. Sci., vol. 179, no. 2020, hal. 574–581, 2021, doi: 10.1016/j.procs.2021.01.042.Google ScholarGoogle Scholar
  11. H. H. Elkarash, N. M. Elshennawy, dan E. A. Saliam, “Evaluating QoS using Scheduling Algorithms in MPLS/VPN/WiMAX Networks,” in 2017 13th International Computer Engineering Conference (ICENCO), Des 2017, vol. 2018-Janua, hal. 14–19. doi: 10.1109/ICENCO.2017.8289755.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. A. Caicedo-Muñoz, A. Ledezma Espino, J. C. Corrales, dan A. Rendón, “QoS-Classifier for VPN and Non-VPN traffic based on time-related features,” Comput. Networks, vol. 144, hal. 271–279, Okt 2018, doi: 10.1016/j.comnet.2018.08.008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. D. Atmadja, F. A. Soelistianto, dan H. M. Khristiana, “PPTP VPN and L2TP/IPsec VPN Performance as Voice Data Security in VoIP,” IARJSET, vol. 9, no. 8, Agu 2022, doi: 10.17148/IARJSET.2022.9809.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Narayan, S. Ishrar, A. Kumar, R. Gupta, dan Z. Khan, “Performance Analysis of 4to6 and 6to4 Transition Mechanisms over Point to Point and IPSec VPN Protocols,” in 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN), Jul 2016, vol. 2016-Novem, hal. 1–7. doi: 10.1109/WOCN.2016.7759027.Google ScholarGoogle ScholarCross RefCross Ref
  15. Zabellnur dan B. Arifwidodo, “Performansi EoIP-PPTP dengan EOIP-L2TP pada Router Mikrotik,” J. Telecommun. Electron. Control Eng., vol. 2, no. 1, hal. 01–07, Jan 2020, doi: 10.20895/jtece.v2i1.104.Google ScholarGoogle ScholarCross RefCross Ref
  16. I. Nurhaida dan Ngadiyono, “Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec,” in Proceedings of the 2019 Asia Pacific Information Technology Conference on - APIT 2019, 2019, no. 1, hal. 91–99. doi: 10.1145/3314527.3314543.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Jahan, M. S. Rahman, dan S. Saha, “Application Specific Tunneling Protocol Selection for Virtual Private Networks,” in 2017 International Conference on Networking, Systems and Security (NSysS), Jan 2017, hal. 39–44. doi: 10.1109/NSysS.2017.7885799.Google ScholarGoogle ScholarCross RefCross Ref
  18. S. T. Aung dan T. Thein, “Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks,” in 2020 IEEE Conference on Computer Applications(ICCA), Feb 2020, hal. 1–5. doi: 10.1109/ICCA49400.2020.9022848.Google ScholarGoogle Scholar
  19. J. Kumar, M. Kumar, D. K. Pandey, dan R. Raj, “Encryption and Authentication of Data Using the IPSEC Protocol,” in Lecture Notes in Electrical Engineering, vol. 673, 2021, hal. 855–862. doi: 10.1007/978-981-15-5546-6_71.Google ScholarGoogle ScholarCross RefCross Ref
  20. Shodan, “List of Countries by Number of MikroTik Devices in Use.” https://www.shodan.io/search/facet?query=mikrotik&facet=country (diakses 7 September 2022).Google ScholarGoogle Scholar
  21. MikroTik, “RB951Ui-2HnD Specifications.” https://mikrotik.com/product/RB951Ui-2HnD (diakses 21 Oktober 2022).Google ScholarGoogle Scholar

Index Terms

  1. QoS Analysis of Site-to-Site VPN and Its Integration Potential for Securing Communication on Electric Vehicles

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IC3INA '22: Proceedings of the 2022 International Conference on Computer, Control, Informatics and Its Applications
      November 2022
      415 pages
      ISBN:9781450397902
      DOI:10.1145/3575882

      Copyright © 2022 ACM

      © 2022 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 February 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)34
      • Downloads (Last 6 weeks)12

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format