Research Article

Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol

by  Mohit Wadhwa, Manju Khari
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Issue 3
Published: April 2011
Authors: Mohit Wadhwa, Manju Khari
10.5120/2412-3222
PDF

Mohit Wadhwa, Manju Khari . Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol. International Journal of Computer Applications. 20, 3 (April 2011), 35-39. DOI=10.5120/2412-3222

                        @article{ 10.5120/2412-3222,
                        author  = { Mohit Wadhwa,Manju Khari },
                        title   = { Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 20 },
                        number  = { 3 },
                        pages   = { 35-39 },
                        doi     = { 10.5120/2412-3222 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Mohit Wadhwa
                        %A Manju Khari
                        %T Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol%T 
                        %J International Journal of Computer Applications
                        %V 20
                        %N 3
                        %P 35-39
                        %R 10.5120/2412-3222
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The next generation protocol (Ipv6) also called Iping, which should replace the current generation of Internet protocol (Ipv4), brings many enhancements over Ipv4. Ipv4 has been a great success for more than 20 years, since its interception in 1980 but due to limited address space, complex configuration and very important lack of security it does not fulfil the requirement of the exponentially growing internet. Because of inadequate address and for other issues, Ipv6 was proposed by the network working group of the internet engineering taskforce (IETF) which provides many new features like quality of services, auto-address configuration, end to end connectivity, security, simple routing header and so on. This paper identifies security holes to the new features introduced in Ipv6 and security holes that are not altered by new futures of Ipv6.

References
  • S.deering and R.hinden, Internet protocol version 6 (Ipv6) specification, RFC 2460, December 1998
  • L. ladid, 3G Mobile Communication Technologies, Second International Conference on (Conf. Publ. No. 477),IEEE2001
  • Cooper M, Yen DC. IPv6: business applications and implementation concerns. Computer Standards and Interfaces, vol. 28. Elsevier Science; 2005, 27–41
  • Microsoft Corporation, Introduction to IP version 6, January2008
  • Penny Hermann-Seton, Security features in IPv6 [Availableonline], http://www.sans.org/reading_room/whitepaper/protocols/security_features_ipv6_380, Last Visit-December 4, 2010
  • O’ Rielly, IPv6 Essentials, [Available online] Last visit-12Feb.2011
  • G. Van de Velde et al., Local Network Protection for IPv6, IETF RFC 4684; www.rfc-archive.org/getrfc. php?rfc=4864&tag=Local-Network-Protection-for-IPv6, May2007
  • R. Radhakrishnan, Majid Millia, Shabana Mehfuz and Moinuddin, Security issues in IPv6, IEEE 2007
  • Davies. J, Understanding IPv6, Microsoft Corporation, 2003
  • [Radwan, A.M, IPsec: a basis for IPv6 security [available online] http://www.IPv6style.jp/en/tech/20040707/index.html 2005Lastvisit-December2010
  • Mohit wadhwa, Suresh kumar: Security Flaws Common in IPV4/IPV6 & Security Issues in IPV6: A Study, ICSE 2011
  • Jeodeok lim, youngki kim, protection algorith against security holes of ipv6 routing header, ICACT2006
  • Carlos E. Caicedo and James B.D. Joshi : IPv6 Security Challenges,IEEE,2009
  • Sean Convery Darrin Miller: IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0)
  • Popoviciu C.; Levy-Avegnoli, E.; Grossetete, P., Deploying IPv6 Networks, Cisco Press, Indianapolis, IN, 2006
  • IPv6 Security from point of view firewalls, Janos Mohácsi 09/June/2004, Information societ technologies, 6net
  • Steffeno M. Faccin and Franck Lee, A secure and efficient solution to the IPv6 address ownership problem IEEE,2000.
  • Dequan Yang, Xu Song and Qiao Guo, Security in IPv6 IEEE,2010.
  • http://www.scribd.com/doc/6394/Basic-Sniffer-Attacks Last visit - December 2010
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ipv4 Ipv6 Ipsec NAT TCP/IP security holes IP

Powered by PhDFocusTM