T. Ylonen and C. Lonvick, The Secure Shell (SSH) Protocol Architecture, RFC, vol.4251, 2006.
DOI : 10.17487/rfc4251

S. Kent and K. Seo, Security Architecture for the Internet Protocol, RFC, vol.4301, 2005.

D. Harkins and D. Carrel, The Internet Key Exchange (IKE) RFC 2409 (Proposed Standard), 1998.

S. Kent, IP Encapsulating Security Payload (ESP), RFC, vol.4303, 2005.

K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little et al., Point-to-Point Tunneling Protocol (PPTP), Generic Routing Encapsulation (GRE). RFC 1701 (Informational), 1994.
DOI : 10.17487/rfc2637

D. Piper, The Internet IP Security Domain of Interpretation for ISAKMP, 1998.
DOI : 10.17487/rfc2407

C. Kaufman, Internet Key Exchange (IKEv2) Protocol. RFC 4306 (Proposed Standard), 2005.
DOI : 10.17487/rfc5996

S. Sakane, K. Kamada, M. Thomas, and J. Vilhuber, Kerberized Internet Negotiation of Keys (KINK), RFC, vol.4430, 2006.
DOI : 10.17487/rfc4430

«. Website and . Kerberos, The Network Authentication Protocol, p.13, 2011.

M. Richardson and D. H. Redelmeier, Opportunistic Encryption using the Internet Key Exchange (IKE) [16] The Openswan project website, https, RFC, vol.4322, issue.03, p.9, 2005.

S. Website, the Open Source IPsec-based VPN Solution, p.9, 2012.

J. Loughney, IPv6 Node Requirements, RFC, vol.4294, 2006.
DOI : 10.17487/rfc4294

S. Deering and R. Hinden, Version 6 (IPv6) Specification. RFC 2460 (Draft Standard), Internet Protocol, p.5722, 1998.
DOI : 10.17487/rfc1883

C. Partridge and A. Jackson, IPv6 Router Alert Option, RFC, vol.2711, 1999.
DOI : 10.17487/rfc2711

S. Murphy, BGP Security Vulnerabilities Analysis, RFC, vol.4272, 2006.
DOI : 10.17487/rfc4272

S. Kent, C. Lynn, and K. Seo, Secure Border Gateway Protocol (S-BGP), IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.582-592, 2000.
DOI : 10.1109/49.839934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.762

. Virtualbox-website, The Network Emulation webpage, p.13, 2011.