ABSTRACT
Today, one of the challenges and hot issues related to Electric Vehicles (EV) is communication security, especially in the exchange of sensitive information on EVs. Virtual Private Network (VPN) is present as an alternative for those who need a communication network with reliable connectivity and security. VPNs have different types of protocols, some of which are Point-to-Point Tunneling Protocol (PPTP) and Ethernet over IP (EoIP) combined with IPSec (EoIP/IPSec). The purpose of this study aimed to analyze and compare the Quality of Service (QoS) generated by PPTP and EoIP/IPSec, then see the potential for integration of the combination between EoIP and IPSec as an effort of securing communications on EVs. QoS measurements were carried out using the TIPHON standard whose parameters consist of delay, jitter, packet loss, and throughput, as well as additional parameters such as CPU consumption and network security review. Throughput testing on the VPN client side was also carried out. The results of this study indicate that the combination of EoIP and IPSec, both in terms of performance and security, is possible and has the potential to be integrated into EVs.
Supplemental Material
Available for Download
- A. Bourass, S. Cherkaoui, dan L. Khoukhi, “Secure Communication Scheme for Electric Vehicles in the Smart Grid,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Des 2017, vol. 2018-Janua, no. Icd, hal. 1–5. doi: 10.1109/GLOCOM.2017.8254479.Google ScholarDigital Library
- Y. Fraiji, L. Ben Azzouz, W. Trojet, dan L. A. Saidane, “Cyber security issues of Internet of electric vehicles,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2018, vol. 2018-April, hal. 1–6. doi: 10.1109/WCNC.2018.8377181.Google ScholarDigital Library
- M. S. U. Alam, S. Iqbal, M. Zulkernine, dan C. Liem, “Securing Vehicle ECU Communications and Stored Data,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Mei 2019, vol. 2019-May, hal. 1–6. doi: 10.1109/ICC.2019.8762043.Google ScholarCross Ref
- B. Ma , “An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP,” Sensors, vol. 22, no. 2, hal. 647, Jan 2022, doi: 10.3390/s22020647.Google ScholarCross Ref
- W. Sholihah, T. Rizaldi, dan I. Novianty, “Information and communication system technology with VPN site-to-site IPsec,” J. Phys. Conf. Ser., vol. 1193, no. 1, hal. 012012, Apr 2019, doi: 10.1088/1742-6596/1193/1/012012.Google Scholar
- T. E. Madhadi dan L. Y. Banowosari, “Analisis Perbandingan Performasi QoS VPN Encryption Protocol pada Jaringan Berbasis Hybrid Cloud,” J. Ilm. Komputasi, vol. 20, no. 1, hal. 69–82, Mar 2021, doi: 10.32409/jikstik.20.1.2695.Google Scholar
- M. H. M. Zaharuddin, R. A. Rahman, dan M. Kassim, “Technical Comparison Analysis of Encryption Algorithm on Site-to-Site IPSec VPN,” in 2010 International Conference on Computer Applications and Industrial Electronics, Des 2010, no. Iccaie, hal. 641–645. doi: 10.1109/ICCAIE.2010.5735013.Google ScholarCross Ref
- J. Jones, H. Wimmer, dan R. J. Haddad, “PPTP VPN: An Analysis of The Effects of a DDoS Attack,” in 2019 SoutheastCon, Apr 2019, vol. 2019-April, hal. 1–6. doi: 10.1109/SoutheastCon42311.2019.9020514.Google Scholar
- B. A. Widodo, “Analisis Quality of Service pemanfaatan Ethernet Over IP(EoIP) Tunnel di MikrotikRouterOS dengan Routing Protocol OSPF,” J. Informatics, Inf. Syst. Softw. Eng. Appl., vol. 1, no. 1, hal. 1–8, Sep 2018, doi: 10.20895/inista.v1i1.17.Google Scholar
- F. W. P. Dharma dan Suharjito, “Enhancing Branch Office Network Availability Using Cloud EoIP Gateway,” Procedia Comput. Sci., vol. 179, no. 2020, hal. 574–581, 2021, doi: 10.1016/j.procs.2021.01.042.Google Scholar
- H. H. Elkarash, N. M. Elshennawy, dan E. A. Saliam, “Evaluating QoS using Scheduling Algorithms in MPLS/VPN/WiMAX Networks,” in 2017 13th International Computer Engineering Conference (ICENCO), Des 2017, vol. 2018-Janua, hal. 14–19. doi: 10.1109/ICENCO.2017.8289755.Google ScholarCross Ref
- J. A. Caicedo-Muñoz, A. Ledezma Espino, J. C. Corrales, dan A. Rendón, “QoS-Classifier for VPN and Non-VPN traffic based on time-related features,” Comput. Networks, vol. 144, hal. 271–279, Okt 2018, doi: 10.1016/j.comnet.2018.08.008.Google ScholarDigital Library
- M. D. Atmadja, F. A. Soelistianto, dan H. M. Khristiana, “PPTP VPN and L2TP/IPsec VPN Performance as Voice Data Security in VoIP,” IARJSET, vol. 9, no. 8, Agu 2022, doi: 10.17148/IARJSET.2022.9809.Google ScholarCross Ref
- S. Narayan, S. Ishrar, A. Kumar, R. Gupta, dan Z. Khan, “Performance Analysis of 4to6 and 6to4 Transition Mechanisms over Point to Point and IPSec VPN Protocols,” in 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN), Jul 2016, vol. 2016-Novem, hal. 1–7. doi: 10.1109/WOCN.2016.7759027.Google ScholarCross Ref
- Zabellnur dan B. Arifwidodo, “Performansi EoIP-PPTP dengan EOIP-L2TP pada Router Mikrotik,” J. Telecommun. Electron. Control Eng., vol. 2, no. 1, hal. 01–07, Jan 2020, doi: 10.20895/jtece.v2i1.104.Google ScholarCross Ref
- I. Nurhaida dan Ngadiyono, “Quality of Service for Traffic Monitoring System based on Static Routing using EoIP Tunnel over IPSec,” in Proceedings of the 2019 Asia Pacific Information Technology Conference on - APIT 2019, 2019, no. 1, hal. 91–99. doi: 10.1145/3314527.3314543.Google ScholarDigital Library
- S. Jahan, M. S. Rahman, dan S. Saha, “Application Specific Tunneling Protocol Selection for Virtual Private Networks,” in 2017 International Conference on Networking, Systems and Security (NSysS), Jan 2017, hal. 39–44. doi: 10.1109/NSysS.2017.7885799.Google ScholarCross Ref
- S. T. Aung dan T. Thein, “Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks,” in 2020 IEEE Conference on Computer Applications(ICCA), Feb 2020, hal. 1–5. doi: 10.1109/ICCA49400.2020.9022848.Google Scholar
- J. Kumar, M. Kumar, D. K. Pandey, dan R. Raj, “Encryption and Authentication of Data Using the IPSEC Protocol,” in Lecture Notes in Electrical Engineering, vol. 673, 2021, hal. 855–862. doi: 10.1007/978-981-15-5546-6_71.Google ScholarCross Ref
- Shodan, “List of Countries by Number of MikroTik Devices in Use.” https://www.shodan.io/search/facet?query=mikrotik&facet=country (diakses 7 September 2022).Google Scholar
- MikroTik, “RB951Ui-2HnD Specifications.” https://mikrotik.com/product/RB951Ui-2HnD (diakses 21 Oktober 2022).Google Scholar
Index Terms
- QoS Analysis of Site-to-Site VPN and Its Integration Potential for Securing Communication on Electric Vehicles
Recommendations
VPN Analysis and New Perspective for Securing Voice over VPN Networks
ICNS '08: Proceedings of the Fourth International Conference on Networking and ServicesSecurity and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non-repudiation. The available solutions are generic and do not respect voice ...
Critical vpn security analysis and new approach for securing voip communications over vpn networks
WMuNeP '07: Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modelingSecurity presents a big challenge for transmitting voice traffic over the Internet. The goal is to acquire the same security level offered.
Securing VPN from insider and outsider bandwidth flooding attack
AbstractGlobalization is the order of the day. Linking globally dispersed corporate offices and securing the data transferred between them is a critical activity. Virtual Private Network (VPN) is a viable and low cost option. VPN is cost effective as the ...
Comments