Protecting home agent client from IPv6 routing header vulnerability in mixed IP networks

Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal contents. Thus, mobility in mixed IPv4/IPv6 netwo...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Tamimi, Bassam Naji, Shenify, Mohamed, Budiarto, Rahmat
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2015
Subjects:
Online Access:http://repo.uum.edu.my/24082/1/JICT%2014%202015%2077%E2%80%9393.pdf
http://repo.uum.edu.my/24082/
http://jict.uum.edu.my/index.php/previous-issues/143-vol-14-2015
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal contents. Thus, mobility in mixed IPv4/IPv6 networks introduces new security vulnerabilities. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be used by attackers to bypass the network security devices. This paper proposes an algorithm (V6HAPA) for protecting home agent clients from the routing header vulnerability, considering that the home agents reside behind an IPv4 Network Address Translation (NAT) router. The experimental results show that the V6HAPA provides enough confidence to protect the home agent clients from attackers.