
S. Jahan, M. S. Rahman and S. Saha, “Application specific tunneling protocol selection for Virtual Private Networks,” 2017 International Conference on Networking, Systems and Security (NSysS), Dhaka, 2017, pp. 39-44 https://ieeexplore-ieee-org.mutex.gmu.edu/document/7885799
This article talks about how VPNs are increasing in usage and extensively goes over the different tunneling techniques for VPNs to transfer data between one endpoint to another. It goes which protocols are better for security and which ones are better for faster communication. It also goes in depth about the types of VPN networks and solutions that should be considered based on what is required. Then it wraps things up by evaluating the performance of these protocols through a specific network setup. The conclusion then talks about which would be more suitable for each job based on what they might be used for.
A. Alshalan, S. Pisharody and D. Huang, “A Survey of Mobile VPN Technologies,” in IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1177-1196, Secondquarter 2016 https://ieeexplore-ieee-org.mutex.gmu.edu/document/7314859
rese
This talks about how VPNs are the usual approach for a secure end to end connection between two points. It talks about how wired VPN networks are more reliable than the wireless VPN solution, and it also talks about the various mobile VPN solutions available. It goes into exhaustive detail about the protocols, network components, and VPN classification. It even has an entire section devoted to it talking about mobile VPNs and the different advantages and disadvantages to them. It talks about the requirements for mobile VPNs and related solutions to it.
J. Zhang, “Research on Key Technology of VPN Protocol Recognition,” 2018 IEEE International Conference of Safety Produce Informatization (IICSPI), Chongqing, China, 2018, pp. 161-164 https://ieeexplore-ieee-org.mutex.gmu.edu/document/8690472
Zhang discusses how VPN technology has become more widespread than before. To achieve security in the information transmission, VPN traffic has many different options for encryption and privacy. Since encryption has become more complex over the years, routing VPN protocols has become more difficult. It talks about how VPNs provide security and privacy, but also suggests a new method for protocol recognition. As VPN tunnels have become enhanced, inspecting VPN traffic has become more difficult, and so complex, that machines are more susceptible to making a mistake with recognition. Essentially, it goes over how VPNs work, and how auditing can be improved.
Anderson, J., Skare, E., & Dorroll, C. (2018). Nothing to Hide, Nothing to Fear? Tools and Suggestions for Digital Data Protection. The Qualitative Report, 23(5), 1223-1236. https://search-proquest-com.mutex.gmu.edu/scholarly-journals/nothing-hide-fear-tools-suggestions-digital-data/docview/2049976728/se-2?accountid=14541
This journal talks about the current cyber infrastructure and how it has given us new tools to do research, but there’s also the issue of how that same structure can be exploited to make surveillance possible. It talks about the various resources that can be used to avoid surveillance, and VPNs are one of those tools that can come on handy. The article talks about how social media and the internet can be used to gather information and talk to colleagues about said topics. However, it also mentions how government agencies depend on this kind of data, and how sensitive data from researchers can be used for malicious intentions by unrelated third parties. The authors stresses that they aren’t trying to make a dystopian image of current issues, but they instead advise how a researcher can be cautious in our digital age. It’s separated into three different sections, as they first talked about their own experiences and challenges they faced using digital tools, then talks about the tools that can be used to secure their data, and then summarizes the article at large.
Hennig, N. (2018). Security. Library Technology Reports, 54(3), 8. https://search-proquest-com.mutex.gmu.edu/scholarly-journals/security/docview/2020766618/se-2?accountid=14541
This journal talks about how backing up your data is important for protecting it, while also pointing out how many users don’t have backups for their systems. It’s mainly about how cloud services can be used to back up your data, and the various services that are there, including VPNs. They can be used to protect your data, and how prices for them are relatively cheap to use. ISPs (or Internet Service Providers) can keep track of all the sites you visit, as well as other entities, but with a VPN, they can’t see what you are doing. It mentions how VPNs are varied, as they can be used for many different platforms, such as Windows, IOS, Android, Mac, and so on. Now, this journal talks about security first, and foremost, so it doesn’t just talk about VPNs. It talks about how to avoid getting phished, ransomware, man in the middle attacks, managing your passwords, and a lot of other useful information.
CRAWSHAW, D. (2020). VPN Everything is New Again. ACM Queue, 18(5), 1–13. http://web.a.ebscohost.com.mutex.gmu.edu/ehost/detail/detail?vid=5&sid=23b509b9-274b-44e9-92ce-c58ab557e395%40sdc-v-sessmgr03&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=iih&AN=147704299
This academic journal first explains how VPNs were created, and created a timeline of events about the different protocols that were created, as well as when consumers were able to get their own VPNs. It goes on to talk about how it was used in the beginning, since smaller organizations created it to have a connecting line between each other to save money. It also mentions Point to Point Protocol (PPTP), and IPSec, which are security protocols and how they began back in the 90s. Next it starts talking about how computers were more widely owned and used in the 2000s, and how VPNs were being used to connect offices together. It talks about various other topics, but towards the end it also mentions how computers have been used in recent years and how VPNs are being used more widely outside of corporate setups.
Williams, W. (2019, Oct). Don’t Install ‘FREE’ VPNs. Web User, , 40-45. https://search-proquest-com.mutex.gmu.edu/magazines/dont-install-free-vpns/docview/2307075113/se-2?accountid=14541
It’s a magazine section about how free VPNs can be dangerous and analyzes the various free VPNs that you can use. It also goes over which VPN services are useful and which ones can be dangerous. It talks about the various risks involved with using free VPNs, like malware, the free VPNs selling your data, slow speeds, and so on. It does bring up some free VPNs that are safe, but largely still recommends other options, like VPNs you pay for or proxy servers. In the end of the magazine section, it talks about how to check VPN security.