{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T06:33:40Z","timestamp":1751438020630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672618"},{"type":"electronic","value":"9783319672625"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67262-5_7","type":"book-chapter","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T17:04:46Z","timestamp":1504199086000},"page":"83-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance"],"prefix":"10.1007","author":[{"given":"Frederic","family":"Pohl","sequence":"first","affiliation":[]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,1]]},"reference":[{"key":"7_CR1","unstructured":"openVPN. https:\/\/openvpn.net\/"},{"key":"7_CR2","unstructured":"Performance co-pilot. http:\/\/pcp.io"},{"key":"7_CR3","unstructured":"QEMU, the fast! processor emulator. http:\/\/www.qemu.org"},{"key":"7_CR4","unstructured":"strongSwan, opensource IPsec-based VPN solution. https:\/\/strongswan.org\/"},{"key":"7_CR5","unstructured":"FIPS PUB 197, Advanced Encryption Standard (AES) , U.S. Department of Commerce\/National Institute of Standards and Technology (2001)"},{"key":"7_CR6","unstructured":"FIPS PUB 180\u20132, secure hash standard, U.S. Department of Commerce\/National Institute of Standards and Technology (2002)"},{"key":"7_CR7","first-page":"186","volume":"2014","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov, A., Lauridsen, M.M., Tischhauser, E.: AES-based authenticated encryption modes in parallel high-performance software. IACR Crypt. ePrint Arch. 2014, 186 (2014)","journal-title":"IACR Crypt. ePrint Arch."},{"key":"7_CR8","unstructured":"Brunner, T.: IKEv2 mediation extension. Internet-Draft draft-brunner-ikev2-mediation-00, IETF Secretariat , April 2008. http:\/\/www.ietf.org\/internet-drafts\/draft-brunner-ikev2-mediation-00.txt"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) protocol version 1.2. RFC 5246, RFC Editor, August 2008. http:\/\/www.rfc-editor.org\/rfc\/rfc5246.txt","DOI":"10.17487\/rfc5246"},{"key":"7_CR10","unstructured":"Duque Ant\u00f3n, S., Fraunholz, D., Zemitis, J., Pohl, F., Schotten, H.D.: Highly scalable and flexible model for effective aggregation of context-based data in generic IIoT scenarios. In: Kopp, O., Lenhard, J., Pautasso, C. (eds.) 9th Central European Workshop on Services and Their Composition, Central European Workshop on Services and Their Composition (ZEUS-2017), CEUR Workshop Proceedings, 13\u201314 February, Lugano, Switzerland, pp. 51\u201358 (2017). 4"},{"key":"7_CR11","unstructured":"Kagermann, H., Wahlster, W., Helbig, J.: Recommendations for implementing the strategic initiative INDUSTRIE 4.0: securing the future of German manufacturing industry. Forschungsunion (2013)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, T.: Internet key exchange protocol version 2 (IKEv2). RFC 7296, RFC Editor, October 2014. https:\/\/www.rfc-editor.org\/rfc\/rfc7296.txt","DOI":"10.17487\/rfc7296"},{"key":"7_CR13","unstructured":"Kent, S., Seo, K.: Security architecture for the internet protocol. RFC 4301, RFC Editor, December 2005. https:\/\/www.rfc-editor.org\/rfc\/rfc4301.txt"},{"issue":"10","key":"7_CR14","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2004.1341273","volume":"42","author":"S Khanvilkar","year":"2004","unstructured":"Khanvilkar, S., Khokhar, A.: Virtual private networks: an overview with performance evaluation. IEEE Commun. Mag. 42(10), 146\u2013154 (2004)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kotuliak, I., Ryb\u00e1r, P., Truchly, P.: Performance comparison of IPsec and TLS based VPN technologies. In: 2011 9th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 217\u2013221. IEEE (2011)","DOI":"10.1109\/ICETA.2011.6112567"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Migault, D., Palomares, D., Guggemos, T., Wally, A., Laurent, M., Wary, J.P.: Recommendations for IPsec configuration on homenet and M2M devices. In: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015, pp. 9\u201317, NY, USA (2015). http:\/\/doi.acm.org\/10.1145\/2815317.2815323","DOI":"10.1145\/2815317.2815323"},{"key":"7_CR17","unstructured":"Novickis, T.: Protocol state fuzzing of an openVPN (2016)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J., Lear, E.: Address allocation for private internets. RFC 1918, RFC Editor, January 1996. https:\/\/www.rfc-editor.org\/rfc\/rfc1918.txt","DOI":"10.17487\/rfc1918"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2015)","DOI":"10.1145\/2744769.2747942"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Egevang, K.: Traditional IP Network Address Translator (Traditional NAT). RFC 3022, RFC Editor, January 2001. https:\/\/www.rfc-editor.org\/rfc\/rfc3022.txt","DOI":"10.17487\/rfc3022"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67262-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T01:22:41Z","timestamp":1631928161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67262-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672618","9783319672625"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67262-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESOCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Service-Oriented and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esocc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/esocc2017.ifi.uio.no\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}