{"id":"https://openalex.org/W7114777686","doi":"https://doi.org/10.1109/access.2025.3643316","title":"MilTAP: A Tunnel-Aware Authentication and AI-Driven Policy Enforcement Protocol for Military VPN Networks","display_name":"MilTAP: A Tunnel-Aware Authentication and AI-Driven Policy Enforcement Protocol for Military VPN Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7114777686","doi":"https://doi.org/10.1109/access.2025.3643316"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3643316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3643316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3643316","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Goutham Sunkara","orcid":"https://orcid.org/0009-0001-0633-0890"},"institutions":[{"id":"https://openalex.org/I1296127346","display_name":"Broadcom (Israel)","ror":"https://ror.org/01jsrac29","country_code":"IL","type":"company","lineage":["https://openalex.org/I1296127346","https://openalex.org/I4210127325"]},{"id":"https://openalex.org/I4210127325","display_name":"Broadcom (United States)","ror":"https://ror.org/035gt5s03","country_code":"US","type":"company","lineage":["https://openalex.org/I4210127325"]}],"countries":["IL","US"],"is_corresponding":true,"raw_author_name":"Goutham Sunkara","raw_affiliation_strings":["Broadcom Inc., Palo Alto, USA"],"affiliations":[{"raw_affiliation_string":"Broadcom Inc., Palo Alto, USA","institution_ids":["https://openalex.org/I1296127346","https://openalex.org/I4210127325"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kamal Mohammed Najeeb Shaik","orcid":"https://orcid.org/0009-0009-1450-6495"},"institutions":[{"id":"https://openalex.org/I4210108451","display_name":"Palo Alto Networks (United States)","ror":"https://ror.org/01rn6rn86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210108451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kamal Mohammed Najeeb Shaik","raw_affiliation_strings":["Palo Alto Networks, Santa Clara, USA"],"affiliations":[{"raw_affiliation_string":"Palo Alto Networks, Santa Clara, USA","institution_ids":["https://openalex.org/I4210108451"]}]},{"author_position":"last","author":{"id":null,"display_name":"Chetan Reddy Yeddula","orcid":"https://orcid.org/0009-0007-4246-0434"},"institutions":[{"id":"https://openalex.org/I135428043","display_name":"Cisco Systems (United States)","ror":"https://ror.org/03yt1ez60","country_code":"US","type":"company","lineage":["https://openalex.org/I135428043"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chetan Reddy Yeddula","raw_affiliation_strings":["Cisco Systems Inc., San Jose, USA"],"affiliations":[{"raw_affiliation_string":"Cisco Systems Inc., San Jose, USA","institution_ids":["https://openalex.org/I135428043"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I1296127346","https://openalex.org/I4210127325"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63382232,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"216842","last_page":"216855"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23600000143051147,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23600000143051147,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.22990000247955322,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.08659999817609787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.46309998631477356},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4580000042915344},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.44209998846054077},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4413999915122986},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.42179998755455017},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4041000008583069},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39989998936653137},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.396699994802475},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.383899986743927},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.36910000443458557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7914000153541565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6998999714851379},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.46309998631477356},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4580000042915344},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.44209998846054077},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4413999915122986},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.42179998755455017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4162999987602234},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4041000008583069},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39989998936653137},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.396699994802475},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.383899986743927},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36910000443458557},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.3682999908924103},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.36550000309944153},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.365200012922287},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.36390000581741333},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.36320000886917114},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.34709998965263367},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.34310001134872437},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3425000011920929},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.32019999623298645},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30809998512268066},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28929999470710754},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2881999909877777},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.28119999170303345},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3643316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3643316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:260a9761812841a4a10214795a0ed625","is_oa":true,"landing_page_url":"https://doaj.org/article/260a9761812841a4a10214795a0ed625","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 216842-216855 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3643316","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3643316","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4670269787311554}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"modern":[1],"military":[2,62],"networks,":[3],"Virtual":[4],"Private":[5],"Networks":[6],"(VPNs)":[7],"are":[8,106],"essential":[9],"for":[10,56,70,174],"safeguarding":[11],"sensitive":[12],"information":[13],"across":[14],"distributed":[15],"operational":[16,157],"and":[17,24,50,94,125,146,167],"command":[18],"facilities.":[19],"However,":[20],"conventional":[21],"authentication":[22,72],"frameworks":[23],"static":[25],"firewall":[26,112],"policies":[27],"often":[28],"lack":[29],"the":[30,57,108,133],"adaptability":[31],"to":[32,39,78,97,114,151],"secure":[33],"dynamic":[34],"VPN":[35,63],"tunnels,":[36],"exposing":[37],"systems":[38],"sophisticated":[40],"adversarial":[41],"threats.":[42],"This":[43],"paper":[44],"presents":[45],"MilTAP,":[46],"a":[47],"Tunnel-Aware":[48],"Authentication":[49],"AI-Driven":[51],"Policy":[52],"Enforcement":[53],"Protocol":[54],"designed":[55],"stringent":[58],"security":[59,129],"requirements":[60],"of":[61],"infrastructures.":[64],"MilTAP":[65,162],"integrates":[66],"robust":[67],"cryptographic":[68],"methods":[69],"mutual":[71],"with":[73,144],"continuous":[74],"tunnel":[75,92],"state":[76],"assessment":[77],"ensure":[79],"resilient":[80],"communications.":[81],"An":[82],"embedded":[83],"AI-based":[84],"anomaly":[85],"detection":[86],"module":[87],"analyzes":[88],"real-time":[89],"telemetry,":[90],"evaluating":[91],"health":[93],"session":[95,123,137],"traffic":[96],"differentiate":[98],"legitimate":[99],"activity":[100],"from":[101],"potential":[102],"attacks.":[103],"When":[104],"anomalies":[105],"detected,":[107],"protocol":[109],"dynamically":[110],"adjusts":[111],"rules":[113],"limit":[115],"or":[116],"revoke":[117],"access,":[118],"mitigating":[119],"threats":[120],"such":[121],"as":[122],"hijacking":[124],"credential":[126],"replay.":[127],"Formal":[128],"analysis":[130],"based":[131],"on":[132],"Real-or-Random":[134],"model":[135],"confirms":[136],"key":[138],"indistinguishability":[139],"against":[140],"probabilistic":[141],"adversaries.":[142],"Verification":[143],"AVISPA":[145],"ProVerif":[147],"further":[148],"demonstrates":[149],"resilience":[150],"diverse":[152],"attack":[153],"vectors":[154],"while":[155],"preserving":[156],"performance.":[158],"Experimental":[159],"results":[160],"indicate":[161],"achieves":[163],"low":[164],"computational":[165],"overhead":[166],"rapid":[168],"response":[169],"times,":[170],"supporting":[171],"its":[172],"suitability":[173],"mission-critical":[175],"defense":[176],"environments.":[177]},"counts_by_year":[],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-12-11T00:00:00"}
