UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 8
August-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2008012


Registration ID:
235862

Page Number

83-90

Share This Article


Jetir RMS

Title

IPV6 Security Overview and Improvement using Deffie Hellman

Abstract

The current Internet version has a number of security problems. The Internet lacks effective privacy and effective authentication mechanisms beneath the application layer. The internet protocol version 6 (IPv6) which is also called internet protocol next generation (IPNG), remedies these shortcomings by having two integrated options that provide security services and improve the level of reliability. The first option is called the Authentication Header (AH) which provides authentication and data integrity and the second options is called the Encapsulating Security Payload (ESP) which provides data integrity and confidentiality to IPv6 datagrams. These both are defined as extension header in IPv6.The internet protocol (IPv6) was developed to extend and eventually replace IPv4’scapabilities but it poses several significant security issues. The emphasis in this paper is to identify the vulnerabilities that come in IPv6 and how to remove those vulnerabilities. The default method for IPv6 address generation uses an Organizationally Unique Identifier (OUI) assigned by the IEEE Standards Association and an Extension Identifier assigned by the hardware manufacturer. For this reason, a node will always have the same Interface ID (IID) whenever it connects to a new network. Because the node's IP address does not change, the node will be vulnerable to privacy related attacks. To remove these issue along with other vulnerabilities (Reconnaissance attack, Extension Header, Denial Of Service (DoS) Attack, Malicious router, Failure of DAD and NUD processes) by the use of mechanism that randomizing the IID during its generation and more importantly, the verification process, but it is the lack of necessary security mechanism and it provides the node with only partial protection against privacy related attacks. In this proposed method to improve the security, I am using cryptographic algorithm called Diffie Hellman (for authentication) and AES algorithm (for encryption and decryption).

Key Words

IPv6, Security issues of IPv6, IPsec, Randomized Interface ID, Extension Header, Security improvement of IPv6, Deffie Hellman, EUI-64, AES, Datagram

Cite This Article

"IPV6 Security Overview and Improvement using Deffie Hellman", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 8, page no.83-90, August-2020, Available :http://www.jetir.org/papers/JETIR2008012.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"IPV6 Security Overview and Improvement using Deffie Hellman", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 8, page no. pp83-90, August-2020, Available at : http://www.jetir.org/papers/JETIR2008012.pdf

Publication Details

Published Paper ID: JETIR2008012
Registration ID: 235862
Published In: Volume 7 | Issue 8 | Year August-2020
DOI (Digital Object Identifier):
Page No: 83-90
Country: south, Delhi, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003016

Print This Page

Current Call For Paper

Jetir RMS