Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
today’s world.Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protected with IPSec Authentication Header (AH). However, as it gains popularity now a day, it will grow into a vital role of the Internet and communications technology in general. IPv6, the latest revision of the Internet Protocol (IP), is intended to replace IPv4, which still carries the vast majority of Internet traffic as of 2014. Protecting all traffic will include Address Resolution Protocol. To protect this, IPSec will need agreed Key. For Key setup, UDP packet is sent, which requires IPSec for secure communication. So IPSec requires Agreed Key and for Key setup IPSec is needed, this creates a loop. To solve this problem Locally Authentication Process is presented in this paper and we provide a taxonomy for the IPv6 Neighbor and Router Discovery threats, describe two new cryptographic methods, Cryptographically Generated Addresses (CGA) and Address Based Keys (ABK), and discuss how these new methods can be used to secure the Neighbor and Router discovery mechanisms. In this process will provide a certificate of ownership of IP address on network Interface card and Public key to provide authorization. On the other hand, it will also reduce the network load.
Authors and Affiliations
Simanta Sarma
Improved LEACH Protocol for Efficient Transmission of Data inWireless Sensor Networks using Ant Colony OptimizationAlgorithm
Abstract: Energy Efficiency is one of an indispensible concern in Wireless Sensor Networks (WSNs) whichminimizes their efficiency and also shortens the lifetime of network. Many efficient routing as well asalgorithmic sc...
A Face Recognition Scheme Based On Principle Component Analysis and Wavelet Decomposition
Abstract: In this paper, a new face recognition system based on Wavelet transform (HWT) and Principal Component Analysis (PCA) is presented. The image face is preprocessed and detected. The Haar wavelet is used...
Energy Efficient Geographic Adaptive Fidelity in Wireless Sensor Networks
Abstract: Wireless sensor network (WSN) is a quickly developing and existing research that has pulled in impressive exploration consideration in the later past. Routing is to figure out the way to send the detected infor...
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
An Intelligence System for Detection of Cancer and Diagnosis
Abstract: Currently the digital images are used in various areas like medical, fashion, architecture, face recognition, finger print recognition and bio metrics. Recently the CBIR reduced the semantic gap between t...