Abstract
This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Davies, J.: Understanding IPv6. Microsoft Press, Redmond (2003)
Popoviciu, C., Levy-Avegnoli, E., Grossetete, P.: Deploying IPv6 Networks. Cisco Press, Indianapolis (2006)
Szigeti, S., Risztics, P.: Will IPv6 bring better security? In: Proceedings 30th Euromicro Conference, August 31- September 3, pp. 532–537 (2004)
Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301 (December 2005), http://tools.ietf.org/html/4301
Karve, A.: IP Security. IT Architect (January 1998), http://www.itarchitect.com/shared/article/showArticle.jhtml?articleId=17600993
Friedl, S.: An illustrated Guide to IPSec, Unixwiz.net (August 2005), http://www.unixwiz.net/techtips/iguide-ipsec.html
Davies, J.: Understanding IPv6. Microsoft Press, Redmond (2003)
Vives, A., Palet, J.: IPv6 Distributed Security: Problem Statement. In: The 2005 Symposium on Applications and the Internet Workshops. Saint Workshops 2005, December 31-January 04, pp. 18–21 (2005)
Sierra, J.M., Ribagorda, A., Munoz, A., Jayaram, N.: Security protocols in the Internet new framework. In: Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 311–317 (1999)
802.11mb Issues List v12 (excel). CID 98, The use of TKIP is deprecated. The TKIP algorithm is unsuitable for the purposes of this standard, January 20 (2009) https://mentor.ieee.org/802.11/file/08/11-08-1127-12-000m-tgmb-issues-list.xls
Balitanas, M., et al.: Security Threats in Auto Vaccination Architecture Implemented in Handheld Device. In: Proceedings of the KAIS Spring Conference 2009 (2009)
http://java.sun.com/j2se/1.3/docs/guide/security/CryptoSpec.html
Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River (1999)
Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: Proceedings of BLISS 2009, Edinburgh, GB. IEEE CS, Los Alamitos (2009) ISBN 978-0-7695-3754
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Balitanas, M., Kim, Th. (2010). IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)