A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols

Gabriel Popescu


In this paper, a comparative analysis of the major modern tunneling protocols used for  secure virtual private network implementations based on the Internet infrastructure will be elaborated.  The purpose of the paper is to help specialists to choose proper protocols for the specific practical implementations. The need for virtual private networks is explained as an introduction. The technical considerations are iterated, and a full classification of all types of virtual private networks is made, by providing the criteria used. The major tunneling protocols of interest and their advantages and disadvantages are described next. The comparative analysis is presented as a table showing the relevant characteristics of each tunneling protocol. Finally, real world best practices of the tunneling protocols iterated are shown as a conclusion.


security, protocol, tunnel, cryptography, algorithm, virtual private network, analysis

Full Text:



Meeta Gupta, Building a Virtual Private Network, Premier Press, 2003

Mark Lewis, Comparing, Designing and Deploying VPNs, Cisco Press, 2006


  • There are currently no refbacks.

Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)