z-logo
open-access-imgOpen Access
PROTECTING HOME AGENT CLIENT FROM IPv6 ROUTING HEADER VULNERABILITY IN MIXED IP NETWORKS
Author(s) -
Bassam Naji Al-Tamimi,
M. Sahmoudi,
Rahmat Budiarto
Publication year - 2015
Publication title -
journal of ict
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.217
H-Index - 10
eISSN - 2180-3862
pISSN - 1675-414X
DOI - 10.32890/jict2015.14.0.8157
Subject(s) - ipv6 , computer network , ipv4 , computer science , computer security , vulnerability (computing) , arp spoofing , ipv6 address , header , network address translation , internet protocol , the internet , operating system
Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal contents. Thus, mobility in mixed IPv4/IPv6 networks introduces new security vulnerabilities. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be used by attackers to bypass the network security devices. This paper proposes an algorithm (V6HAPA) for protecting home agent clients from the routing header vulnerability, considering that the home agents reside behind an IPv4 Network Address Translation (NAT) router. The experimental results show that the V6HAPA provides enough confidence to protect the home agent clients from attackers.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here