CFP last date
20 January 2025
Reseach Article

Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol

by Mohit Wadhwa, Manju Khari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 3
Year of Publication: 2011
Authors: Mohit Wadhwa, Manju Khari
10.5120/2412-3222

Mohit Wadhwa, Manju Khari . Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol. International Journal of Computer Applications. 20, 3 ( April 2011), 35-39. DOI=10.5120/2412-3222

@article{ 10.5120/2412-3222,
author = { Mohit Wadhwa, Manju Khari },
title = { Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 3 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number3/2412-3222/ },
doi = { 10.5120/2412-3222 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:50.704685+05:30
%A Mohit Wadhwa
%A Manju Khari
%T Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 3
%P 35-39
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The next generation protocol (Ipv6) also called Iping, which should replace the current generation of Internet protocol (Ipv4), brings many enhancements over Ipv4. Ipv4 has been a great success for more than 20 years, since its interception in 1980 but due to limited address space, complex configuration and very important lack of security it does not fulfil the requirement of the exponentially growing internet. Because of inadequate address and for other issues, Ipv6 was proposed by the network working group of the internet engineering taskforce (IETF) which provides many new features like quality of services, auto-address configuration, end to end connectivity, security, simple routing header and so on. This paper identifies security holes to the new features introduced in Ipv6 and security holes that are not altered by new futures of Ipv6.

References
  1. S.deering and R.hinden, Internet protocol version 6 (Ipv6) specification, RFC 2460, December 1998
  2. L. ladid, 3G Mobile Communication Technologies, Second International Conference on (Conf. Publ. No. 477),IEEE2001
  3. Cooper M, Yen DC. IPv6: business applications and implementation concerns. Computer Standards and Interfaces, vol. 28. Elsevier Science; 2005, 27–41
  4. Microsoft Corporation, Introduction to IP version 6, January2008
  5. Penny Hermann-Seton, Security features in IPv6 [Availableonline], http://www.sans.org/reading_room/whitepaper/protocols/security_features_ipv6_380, Last Visit-December 4, 2010
  6. O’ Rielly, IPv6 Essentials, [Available online] Last visit-12Feb.2011
  7. G. Van de Velde et al., Local Network Protection for IPv6, IETF RFC 4684; www.rfc-archive.org/getrfc. php?rfc=4864&tag=Local-Network-Protection-for-IPv6, May2007
  8. R. Radhakrishnan, Majid Millia, Shabana Mehfuz and Moinuddin, Security issues in IPv6, IEEE 2007
  9. Davies. J, Understanding IPv6, Microsoft Corporation, 2003
  10. [Radwan, A.M, IPsec: a basis for IPv6 security [available online] http://www.IPv6style.jp/en/tech/20040707/index.html 2005Lastvisit-December2010
  11. Mohit wadhwa, Suresh kumar: Security Flaws Common in IPV4/IPV6 & Security Issues in IPV6: A Study, ICSE 2011
  12. Jeodeok lim, youngki kim, protection algorith against security holes of ipv6 routing header, ICACT2006
  13. Carlos E. Caicedo and James B.D. Joshi : IPv6 Security Challenges,IEEE,2009
  14. Sean Convery Darrin Miller: IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0)
  15. Popoviciu C.; Levy-Avegnoli, E.; Grossetete, P., Deploying IPv6 Networks, Cisco Press, Indianapolis, IN, 2006
  16. IPv6 Security from point of view firewalls, Janos Mohácsi 09/June/2004, Information societ technologies, 6net
  17. Steffeno M. Faccin and Franck Lee, A secure and efficient solution to the IPv6 address ownership problem IEEE,2000.
  18. Dequan Yang, Xu Song and Qiao Guo, Security in IPv6 IEEE,2010.
  19. http://www.scribd.com/doc/6394/Basic-Sniffer-Attacks Last visit - December 2010
Index Terms

Computer Science
Information Sciences

Keywords

Ipv4 Ipv6 Ipsec NAT TCP/IP security holes IP