80
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      THE PERFORMANCE ANALYSIS OF MACsec IN DIFFERENT NETWORK ENVIRONMENTS

      Preprint
      In review
      research-article
        1 , , 2 , 3 , 4
      ScienceOpen Preprints
      ScienceOpen
      Bookmark

            Abstract

            Abstract

            In today's networks, keeping data safe is really important because there's a lot of sensitive information and the infrastructure is crucial. MACsec (Media Access Control Security) is a key solution for making sure that Layer 2 communication stays secure, following strict rules set out in the IEEE 802.1AE protocol. This article aims to thoroughly explore how well MACsec performs across various types of networks, including businesses, factories, and data centers. This article will carefully examine things like how fast it is, how much delay it causes, and how well it handles large amounts of data. The goal is to give a detailed review of how effective MACsec is.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            29 February 2024
            Affiliations
            [1 ] Sheffield Hallam University , Sheffield , South Yorkshire , United Kingdom;
            [2 ] Austin Peay State University, Clarksville,TN,United States;
            [3 ] Indiana University of Pennsylvania, Indiana, PA, United States;
            [4 ] Austin Peay State University, Clarksville, TN, United States;
            Author notes
            Author information
            https://orcid.org/0009-0003-8754-0754
            https://orcid.org/0009-0000-9832-879X
            https://orcid.org/0009-0007-3428-4442
            https://orcid.org/0009-0001-0866-7649
            Article
            10.14293/PR2199.000736.v1
            5032aef6-955c-4f7a-a3c8-1810f393ac60

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 29 February 2024
            Categories

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Security & Cryptology

            Comments

            Comment on this article