Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

Setiyo Budiyanto, Dadang Gunawan

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities. However, the main concern in the application of VoIP technology is the system ability to maintain information confidentiality while guaranteeing protection to its primary users. For this reason, it requires to do the addition of Virtual Private Network (VPN) features. Conceptually, it aims to create connection lines in secret by utilizing the internal network structure (intranet) and to be accessed remotely using tunneling protocols in its security system. The purpose of this research is to compare the Quality of Service (QoS) on several tunneling protocols. Moreover, it is conducted to also analyze several security system mechanisms including Delay, Jitter, Throughput and Packet Loss. This analyzation is used for determining the best quality of some of the piloted tunneling security protocols. Furthermore, this work compares several methods of VoIP voice-call-testing in term of Generic Routing Encapsulation with IPSecurity (GRE+IPSec), Internet Protocol in Internet Protocol based Session Initiation Protocol (IPIP+SIP-based), Secure Socket Layer (SSL), and Layer 2 Tunneling Protocol IPSecurity (L2TP+IPSec). Accordingly, the comparative results show the better performance compared to the existing work, which is proven by the ability of the proposed method to provide the VoIP based on ITU-T.G.1010.

Original languageEnglish
Pages (from-to)60853-60865
Number of pages13
JournalIEEE Access
Volume11
DOIs
Publication statusPublished - 2023

Keywords

  • GRE+IPsec
  • IPIP+SIP-based
  • L2TP
  • SSL
  • VoIP
  • VPN security

Fingerprint

Dive into the research topics of 'Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol'. Together they form a unique fingerprint.

Cite this