What is IPSec? Internet Protocol Security and cellular IoT

IPSec, or Internet Protocol Security, is a protocol that facilitates network communication security. Here’s everything you need to know.
Security
Kelli Harris
September 24, 2021
People around a conference room desk looking at computers

IPSec is a set of protocols that enable encrypted device connections, providing an essential layer for securing data exchanges on a network. Let’s take a closer look at what IPsec is, how it works, and why it’s important for cellular IoT.

What is IPSec?

IPSec stands for Internet Protocol security, and it’s often used to set up a virtual protected network (VPN). It’s a set of protocols between two points on the IP network that provide data authentication, integrity, encryption, decryption, and confidentiality.

How Does IPSec work?

IPSec is a complicated web of processes, incorporating several different technologies and ways of encrypting data. But how it works can be explained in five steps:

1. Defining Interesting Traffic

The IPSec protocols determine what information to encrypt and how to encrypt it based on its destination. Once IPSec has found some interesting traffic, it starts sending the data over to the Internet Key Exchange (IKE). IKE is a hybrid protocol based on the Internet Security Association and Key Management Protocol, which establishes security associations, and the Oakley Protocol, which defines the algorithm used for the data exchange. Think of the Internet Security Association and Key Management Protocol as the key to open the box of data, and the Oakley Protocol as the box itself.

2. Establishing a Secure Connection

Next, the IKE establishes the connection, authenticating IPSec peers, exchanging secret encryption keys, and ensuring that all parties are using the same protocols. This sets the stage for creating a secure tunnel.

3. Building the Tunnel

The next step is setting up the IPSec tunnel, a direct router-to-router connection where all data is encrypted. To do this, the protocols must establish security associations and periodically regenerate the IPSec Security Association.

4. Using the Encrypted Tunnel

Data is sent back and forth through the tunnel based on IPSec parameters and keys.

5. Tunnel Termination

The tunnel can close either through manual deletion or timing out. It can be pre-set to close after a certain number of inactive seconds, or when a predetermined quantity of data have passed through.

Protocols Used in IPSec

Several protocols play roles in the IPSec layer, including:

Authentication Headers

The Authentication Header (AH) supplies data origin authentication, data integrity, and anti-replay services to IP. However, this protocol doesn’t encrypt anything — it just makes sure that information is coming from the right source.

Encapsulating Security Payloads (ESP)

Payloads contain key information to be sent through the network, and the ESP provides security for those packets or payloads by existing as a header between the Internet Protocol/IP and protocols in the upper layer like TCP, ICMP, and UDP. ESP can be applied either in tunnel mode or transport mode.

Internet Security Association and Key Management Protocol (ISAKMP)

A protocol designed to establish security association (SA), ISAKMP provides a framework for key exchange and authentication. Internet Key Exchange (IKE), mentioned earlier, is one source of keys that can be used with ISAKMP.

Why IPSec is Important for Cellular IoT

Here’s why IPSec is useful in cellular IoT:

Device Authentication

IoT devices must connect with one another and the cloud, typically via a gateway. Authentication, which gives each device permission to join the network and exchange information, plays an important role in ensuring data security.

Encryption

Encrypting data is a given for cybersecurity, and best practice is to always use end-to-end encryption.

Secure Tunneling

In its tunnel mode, IPSec can link two networks to create a VPN, which extends a private network across a public network, allowing you to share data across the public network as if you’re connected to a private network. In essence, it’s a tunnel that allows one private network to connect to another via the public internet — while maintaining the security and privacy of both private networks. To achieve that, the VPN encrypts and authenticates all traffic traveling through the tunnel.

Secure Tunneling with Hologram

All IoT devices need a dependable source of connectivity — one that emphasizes security and empowers you to use IPsec to the advantage of your IoT deployment. Hologram’s Spacebridge service allows you to create secure, authenticated tunnels to send data to a device with a Hologram SIM card connected to a cellular network. Hologram supports software-defined network solutions, giving you simpler, faster, less costly options that offer all the same benefits of a private APN without the need to construct your own network.


Get started with Hologram today

  • Talk to an IoT expert
  • Receive a free SIM
  • Customize your plan