Skip to main content

IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

  • Conference paper
Information Security and Assurance (ISA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Included in the following conference series:

  • 1068 Accesses

Abstract

This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.cio.com/article/492101

  2. Davies, J.: Understanding IPv6. Microsoft Press, Redmond (2003)

    Google Scholar 

  3. Popoviciu, C., Levy-Avegnoli, E., Grossetete, P.: Deploying IPv6 Networks. Cisco Press, Indianapolis (2006)

    Google Scholar 

  4. Szigeti, S., Risztics, P.: Will IPv6 bring better security? In: Proceedings 30th Euromicro Conference, August 31- September 3, pp. 532–537 (2004)

    Google Scholar 

  5. Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301 (December 2005), http://tools.ietf.org/html/4301

  6. Karve, A.: IP Security. IT Architect (January 1998), http://www.itarchitect.com/shared/article/showArticle.jhtml?articleId=17600993

  7. Friedl, S.: An illustrated Guide to IPSec, Unixwiz.net (August 2005), http://www.unixwiz.net/techtips/iguide-ipsec.html

  8. Davies, J.: Understanding IPv6. Microsoft Press, Redmond (2003)

    Google Scholar 

  9. Vives, A., Palet, J.: IPv6 Distributed Security: Problem Statement. In: The 2005 Symposium on Applications and the Internet Workshops. Saint Workshops 2005, December 31-January 04, pp. 18–21 (2005)

    Google Scholar 

  10. Sierra, J.M., Ribagorda, A., Munoz, A., Jayaram, N.: Security protocols in the Internet new framework. In: Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 311–317 (1999)

    Google Scholar 

  11. http://en.wikipedia.org/wiki/Data_Encryption_Standard

  12. 802.11mb Issues List v12 (excel). CID 98, The use of TKIP is deprecated. The TKIP algorithm is unsuitable for the purposes of this standard, January 20 (2009) https://mentor.ieee.org/802.11/file/08/11-08-1127-12-000m-tgmb-issues-list.xls

  13. Balitanas, M., et al.: Security Threats in Auto Vaccination Architecture Implemented in Handheld Device. In: Proceedings of the KAIS Spring Conference 2009 (2009)

    Google Scholar 

  14. http://java.sun.com/j2se/1.3/docs/guide/security/CryptoSpec.html

  15. Stallings, W.: Cryptography and Network Security, 2nd edn. Prentice Hall, Upper Saddle River (1999)

    Google Scholar 

  16. Balitanas, M., Robles, R.J., Kim, N., Kim, T.: Crossed Crypto-scheme in WPA PSK Mode. In: Proceedings of BLISS 2009, Edinburgh, GB. IEEE CS, Los Alamitos (2009) ISBN 978-0-7695-3754

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balitanas, M., Kim, Th. (2010). IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics