Analysis of the Security Mechanism of IPV6

2014 ◽  
Vol 926-930 ◽  
pp. 2434-2437
Author(s):  
Jin Meng ◽  
Yu Yang Du ◽  
Xiao Zhang

IPV6 is the next generation networking protocol. It can provide more address space than IPV4 and more secure service. This paper studies the technical features of the IPv6 protocol, discusses IPv6 network security mechanisms.

2014 ◽  
Vol 513-517 ◽  
pp. 2232-2235
Author(s):  
Gui Xin Zhao

At present, IPv4 addresses are facing depletion and do not meet the requirements of the development of the network.Compared with IPv4 protocol, IPv6 protocol has obvious advantages in technology. The next generation internet research based on IPv6 protocol is a hot research field in campus network, now the IPv4 network is also in urgent need of upgrading to IPv6 network. Introduces the dual stack and tunnel technology to upgrade the campus network, analysis of the present situation of the campus network, and design an upgrading scheme in this paper.


2013 ◽  
pp. 387-420
Author(s):  
Artur Arsénio ◽  
Diogo Teixeira ◽  
João Redol

2014 ◽  
Vol 530-531 ◽  
pp. 773-776
Author(s):  
Xin Min Wu ◽  
Hao Shu Wu

First, as the 4G network, the introduction of IPv6 network layer security mechanism, security is enhanced at the same time, IPv6 security mechanism applied to the 4G network system security as well as new demands and challenges, followed by the core network based on IPv6 network security to face the next 4G threats and security problems, concludes with IPv6 technical analysis and 4G network defense and countermeasures.


2012 ◽  
Vol 630 ◽  
pp. 265-270 ◽  
Author(s):  
Xue Feng Jiang ◽  
Shan Jiang ◽  
Jun Rui Liu

Nowadays, IPv4 addresses have been exhausted. IPv6 as the next generation of the Internet Protocol is gradually moving towards practical , Network monitoring is very important to the practical use of IPv6 , The security problems of IPv6 study is not mature, especially the security of IPv6 network security products are less . This study uses the existing IPv4 network security research results, aiming at the characteristic of IPv6 protocol , Analysis of the structure and classification of the IPv6 address , IPv6 addressing, neighbor discovery process, the domain name system , DHCPv6 , ICMPv6, IPv6 routing and security series of IPv6 basics of features , Using WinPcap programming, enabling the network packet capture, content analysis and experimental verification of the system.


2014 ◽  
Vol 556-562 ◽  
pp. 6015-6018
Author(s):  
Xiang Yang

The proposed IPv6 protocol has brought new problems for network security. The new protocol and features were introduced for IPv6 and the new type of attack applicable in the environment of IPv6 was summarized. And then, according to the idea of the attack detection, computers themselves can discover the vulnerabilities and deficiencies of their own systems. Thus the vulnerabilities will be patched up and the security of the system will be improved. We focused our research on designing and realizing the IPv6 network attack platform by designing the overall structure of the platform. Finally, we tested the IPv6 network attack platform. Test results show that the attack effect is remarkable, which plays a role in finding computers’ system vulnerabilities, strengthening security protection and enhancing network security.


Author(s):  
Zhangbing Zhou ◽  
Takahiro Hara ◽  
Deze Zeng ◽  
Yu Zhang ◽  
Chunsheng Zhu

2018 ◽  
Vol 150 ◽  
pp. 06005
Author(s):  
Athirah Rosli ◽  
Abidah Mat Taib ◽  
Wan Nor Ashiqin Wan Ali ◽  
Ros Syamsul Hamid

The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6) equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.


Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


Author(s):  
Rajesh Kumar Meena ◽  
Harnidh Kaur ◽  
Kirti Sharma ◽  
Simran Kaur ◽  
Smriti Sharma

Sign in / Sign up

Export Citation Format

Share Document