{"id":"https://openalex.org/W2735936320","doi":"https://doi.org/10.23919/mipro.2017.7973470","title":"Performance analysis of virtualized VPN endpoints","display_name":"Performance analysis of virtualized VPN endpoints","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2735936320","doi":"https://doi.org/10.23919/mipro.2017.7973470","mag":"2735936320"},"language":"en","primary_location":{"id":"doi:10.23919/mipro.2017.7973470","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro.2017.7973470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048968832","display_name":"D. Lackovic","orcid":null},"institutions":[{"id":"https://openalex.org/I154347574","display_name":"University of Rijeka","ror":"https://ror.org/05r8dqr10","country_code":"HR","type":"education","lineage":["https://openalex.org/I154347574"]}],"countries":["HR"],"is_corresponding":true,"raw_author_name":"D. Lackovic","raw_affiliation_strings":["Department of Computer Engineering, University of Rijeka Faculty of Engineering, Rijeka, Croatia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Rijeka Faculty of Engineering, Rijeka, Croatia","institution_ids":["https://openalex.org/I154347574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033002633","display_name":"M. Tomic","orcid":"https://orcid.org/0000-0002-7230-9838"},"institutions":[{"id":"https://openalex.org/I154347574","display_name":"University of Rijeka","ror":"https://ror.org/05r8dqr10","country_code":"HR","type":"education","lineage":["https://openalex.org/I154347574"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"M. Tomic","raw_affiliation_strings":["Department of Computer Engineering, University of Rijeka Faculty of Engineering, Rijeka, Croatia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Rijeka Faculty of Engineering, Rijeka, Croatia","institution_ids":["https://openalex.org/I154347574"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048968832"],"corresponding_institution_ids":["https://openalex.org/I154347574"],"apc_list":null,"apc_paid":null,"fwci":1.4504,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84448782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"466","last_page":"471"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7682560682296753},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.7359393835067749},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7024816274642944},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.6351930499076843},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6207478046417236},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.6078068614006042},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5984790325164795},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5866304039955139},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5538109540939331},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.42320847511291504},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4202054738998413},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.17796647548675537},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14909759163856506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682560682296753},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.7359393835067749},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7024816274642944},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.6351930499076843},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6207478046417236},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.6078068614006042},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5984790325164795},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5866304039955139},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5538109540939331},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.42320847511291504},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4202054738998413},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.17796647548675537},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14909759163856506}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro.2017.7973470","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro.2017.7973470","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1967422709","https://openalex.org/W2247412367","https://openalex.org/W2321352203","https://openalex.org/W2394878910","https://openalex.org/W2559873242","https://openalex.org/W2561586334","https://openalex.org/W6712267182"],"related_works":["https://openalex.org/W2371101663","https://openalex.org/W2370638195","https://openalex.org/W2291371046","https://openalex.org/W2350672869","https://openalex.org/W2504906136","https://openalex.org/W2413322689","https://openalex.org/W2371096117","https://openalex.org/W2350433134","https://openalex.org/W2347954679","https://openalex.org/W2359171496"],"abstract_inverted_index":{"Virtual":[0],"Private":[1],"Networks":[2],"(VPN)":[3],"are":[4,57,90,168],"an":[5,18,46],"established":[6],"technology":[7],"that":[8,104,144],"provides":[9],"users":[10],"a":[11,149,154,159],"way":[12],"to":[13,33,48,97,134,153,177],"achieve":[14],"secure":[15],"communication":[16,20],"over":[17],"insecure":[19],"channel,":[21],"such":[22,63,101],"as":[23,45,64],"the":[24],"public":[25],"Internet.":[26],"It":[27,41],"has":[28],"been":[29],"widely":[30],"accepted":[31],"due":[32],"its":[34],"flexibility":[35],"and":[36,88,126,138,161],"availability":[37],"on":[38,82],"many":[39],"platforms.":[40],"is":[42,95,174],"often":[43],"used":[44,137],"alternative":[47],"expensive":[49],"leased":[50],"lines.":[51],"In":[52,68,112],"traditional":[53],"setups,":[54],"VPN":[55,77,122,146],"endpoints":[56,78,147],"set":[58],"up":[59],"in":[60,132],"hardware":[61,151],"appliances,":[62],"firewalls":[65],"or":[66],"routers.":[67],"modern":[69],"networks,":[70],"which":[71],"utilize":[72],"Network":[73],"Functions":[74],"Virtualization":[75],"(NFV),":[76],"can":[79,109,157],"be":[80,110,158],"virtualized":[81,155],"common":[83],"servers.":[84],"Because":[85],"data":[86],"encryption":[87,135],"decryption":[89],"CPU":[91],"intensive":[92],"operations,":[93],"it":[94,173],"important":[96],"investigate":[98],"limits":[99],"of":[100,106,118],"setups":[102],"so":[103],"feasibility":[105],"endpoint":[107],"virtualization":[108],"evaluated.":[111],"this":[113],"paper,":[114],"we":[115],"analyze":[116],"performance":[117],"two":[119],"industry":[120],"standard":[121],"implementations":[123],"-":[124],"IPSec":[125],"OpenVPN.":[127],"We":[128],"examine":[129],"TCP":[130],"throughput":[131,166,183],"relation":[133],"algorithm":[136],"packet":[139],"size.":[140],"Our":[141],"experiments":[142],"suggest":[143],"moving":[145],"from":[148],"specialized":[150],"appliance":[152],"environment":[156],"viable":[160],"simple":[162],"solution":[163],"if":[164],"traffic":[165],"requirements":[167],"not":[169],"too":[170],"demanding.":[171],"However,":[172],"still":[175],"difficult":[176],"replace":[178],"high-end":[179],"appliances":[180],"with":[181],"large":[182],"capabilities.":[184]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
