z-logo
open-access-imgOpen Access
Build Encrypted Interconnection Networks by application of IP Security and Mac Address Filtering Authentication Methods
Author(s) -
Jouma Ali AlMohamad
Publication year - 2021
Publication title -
مجلة العلوم الهندسية و تكنولوجيا المعلومات
Language(s) - English
Resource type - Journals
ISSN - 2522-3321
DOI - 10.26389/ajsrp.m280321
Subject(s) - computer science , computer network , computer security , authentication (law) , encryption , mac address , data security , internet security , information security , security service
To improve the security in data networks we use of IP Security and MAC Address Filtering authentication methods on network devices is very useful to be able to protect, verify and filter company data especially if data contain sensitive information like credit cards while using public data network. IP Security authentication provides integrity between connections, then Filtering MAC Address can help the router task to be able recognize users on the network, So that expected the combination between IP Security and Mac Address Filtering will provide security for every transfer and receive data from Headquarter to branch office, then the company doesn't have to worry about data package being robbed or manipulated by the unauthorized parties.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom