0% found this document useful (0 votes)
16 views

Security Aspects & Performance Analysis of Mobile & IP Networks - Contents

The document discusses security aspects of IPv6 networks. It provides an overview of IPv6, including its capabilities and advantages over IPv4. It then discusses IPv6 addressing schemes, packet layout, extension headers, and absence of fragmentation issues. It examines traditional security approaches and mechanisms for IPv6, including firewall capabilities. It analyzes risks and vulnerabilities in IPv6, such as redirection attacks, denial of service attacks, and address privacy issues. Finally, it outlines essential IPv6 security considerations regarding areas like flow labels, ICMPv6, neighbor discovery, and routing headers.

Uploaded by

Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Security Aspects & Performance Analysis of Mobile & IP Networks - Contents

The document discusses security aspects of IPv6 networks. It provides an overview of IPv6, including its capabilities and advantages over IPv4. It then discusses IPv6 addressing schemes, packet layout, extension headers, and absence of fragmentation issues. It examines traditional security approaches and mechanisms for IPv6, including firewall capabilities. It analyzes risks and vulnerabilities in IPv6, such as redirection attacks, denial of service attacks, and address privacy issues. Finally, it outlines essential IPv6 security considerations regarding areas like flow labels, ICMPv6, neighbor discovery, and routing headers.

Uploaded by

Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.INTRODUCTION .............................................................................................

2. SECURITY OF IPV6-BASED NETWORKS ................................................... 4

2.1 IPv6 Overview .................................................................................................................................... 4


2.1.1 IPv6 Basic Capabilities ................................................................................................................... 5
2.1.2 Key Advantages of IPv6 ................................................................................................................. 6

2.2 IPv6 Format & Addressing Scheme .................................................................................................... 8


2.2.1 Format & Addressing scheme used by IPv6 ................................................................................... 8

2.3 Special Purpose IPv6 Addresses .......................................................................................................... 9

2.4 IPv6 Packet-Layout & Extension Headers ......................................................................................... 9

2.5 Absence of Fragmentation issues in IPv6 ......................................................................................... 11

2.6 Migration Issues.................................................................................................................................. 13

2.7 Advanced IPv6-based Protocol Mechanisms – Mobile IPv6 ........................................................... 13

2.8 Basic Operation of Mobile IPv6 ........................................................................................................ 17

2.9 Traditional Security Approaches and Mechanisms -- A brief overview ........................................ 17

2.10 IPv6 Security Mechanisms and Approaches .................................................................................. 19

2.11 Firewall Capabilities ........................................................................................................................ 23


2.11.1 Network Address Translation (NAT) ......................................................................................... 23
2.11.2 Virtual Private Network (VPN) .................................................................................................. 24
2.11.3 Demilitarized Zones (DMZ) ..................................................................................................... 24
2.11.4 Anti-spoofing ............................................................................................................................ 25
2.11.5 Firewall Types .......................................................................................................................... 25
2.11.6 Packet Filter .............................................................................................................................. 25
2.11.7 Proxy ........................................................................................................................................... 26
2.11.8 Stateful Inspection ...................................................................................................................... 26
2.11.9 Firewall Architecture ................................................................................................................ 26

2.12 IPv6 Areas of Security Concerns: Addresses ................................................................................ 27


2.12.1 IPv6 Addressing Security ........................................................................................................... 28
2.12.2 IPv6 Anycast Address Security .................................................................................................. 28
2.12.3 Documented Issues for IPv6 Security ......................................................................................... 28

2.13 Risks and Vulnerabilities ................................................................................................................. 29


2.13.1 Static Session Hijacking ............................................................................................................. 29
2.13.2 Redirection Attacks..................................................................................................................... 30
2.13.3 Denial of Service (Flooding Attacks) ......................................................................................... 31
2.13.4 Address Privacy .......................................................................................................................... 31
2.13.5 Cause Packets to Be Sent to the Attacker ................................................................................... 31
2.13.6 “Classic" Redirection Attack .................................................................................................... 32
2.13.7 Time-Shifting Attack .................................................................................................................. 32
2.13.8 Cause Packets to Be Sent to a Black Hole .................................................................................. 32
2.13.9 Third Party Denial-of-Service Attacks ....................................................................................... 32

2.14 Essential IPv6 Security Considerations .......................................................................................... 33

Security Aspects & Performance Analysis of Mobile & IP Networks Page 1


2.14.1 IPv6 Flow labels Issues............................................................................................................... 33
2.14.2 ICMPv6 Issues ........................................................................................................................... 33
2.14.3 Neighbor Discovery Issues ........................................................................................................ 34
2.14.4 Routing Headers ......................................................................................................................... 35
2.14.5 DNS Issues.................................................................................................................................. 35
2.14.6 Minimum Security Plan .............................................................................................................. 36

References: ................................................................................................................................................ 37

3. PERFORMANCE OF IPV6 AND GIGABIT NETWORKS ......................... 38

3.1 IPv6 Addressing Mechanisms ........................................................................................................... 38


3.1.1 Introduction................................................................................................................................... 38
3.1.2 Addressing Conventions ............................................................................................................... 39
3.1.3 Address Types .............................................................................................................................. 40
3.1.4 Addresses for Hosts and Routers .................................................................................................. 41

3.2 More Advanced IPv6 Protocol Mechanisms .............................................................................. 42


3.2.1 Introduction................................................................................................................................... 42
3.2.2 IPv6 and Related Protocols (Details) ............................................................................................ 42
3.2.3 IPv6 Header Format ...................................................................................................................... 43
3.2.4 IPv6 Extension Headers ................................................................................................................ 43
3.2.5 IPv6 Infrastructure ........................................................................................................................ 44
3.2.6 ICMPv6 message .......................................................................................................................... 46
3.2.7 Dynamic Host Configuration Protocol for IPv6 ........................................................................... 46
3.2.8 Neighbor Discovery for IP Version 6 (IPv6) Protocol .................................................................. 47
3.2.9 Mobile IP Version 6 (MIPv6) ..................................................................................................... 47

3.3 Performance Issues in High Speed (Gigabit) Networks .................................................................. 48


3.3.1 Introduction................................................................................................................................... 48
3.3.2. Performance & Reliability Issues ................................................................................................ 48
3.3.3 Potential Solutions & Alternatives ................................................................................................ 49
3.3.4. Conclusions.................................................................................................................................. 49

References ................................................................................................................................................. 49

4. SECURITY ASPECTS OF MOBILE ADHOC NETWORKS(MANETS) ....... 51

4.1 Fundamentals of Security in Mobile Networks ................................................................................ 51

4.2 Need for Intrusion Detection in Ad hoc Networks ........................................................................... 52

4.3 General overview of Intrusion Detection Techniques ..................................................................... 53

4.4 Unsuitability of the Current IDS techniques for Ad-Hoc paradigm .............................................. 53

4.5 Novel (proposed) architecture for IDS ............................................................................................. 54


4.5.1 Intrusion Response ........................................................................................................................ 56

4.6 Anomaly detection in mobile ad-hoc networks ................................................................................ 57


4.6.1 Detecting Abnormal Updates to Routing Tables .......................................................................... 57
4.6.2 Detecting Anomalous activities in other layers ............................................................................ 57

4.7 Detecting Intrusions as Anomalies .................................................................................................... 58


4.7.1 Conventional Intrusion Detection Systems ................................................................................... 59

Security Aspects & Performance Analysis of Mobile & IP Networks Page 2


4.8 Intrusion Detection Issues in MANETs ............................................................................................ 60

4.9 Proposed Intrusion Detection Systems(IDSs) ................................................................................... 61

4.10 Detection of Misbehaving Nodes ..................................................................................................... 65

4.11 Open Issues & Future Scope............................................................................................................ 66

4.12 Conclusions ....................................................................................................................................... 67

References ................................................................................................................................................. 68

5. PERFORMANCE OF MOBILE ADHOC NETWORKS(MANETS) ............... 68

5.1 Background ......................................................................................................................................... 69

5.2 QoS Provisioning Challenges in MANETs ....................................................................................... 70

5.3 QoS Protocol Performance Issues & Factors ................................................................................... 71

5.4 QoS Models ......................................................................................................................................... 72

5.5 QoS Signaling/Insignia ....................................................................................................................... 75

5.6 QoS Mac Protocol ............................................................................................................................... 77

5.7 QoS Routing Mechanism .................................................................................................................. 78

5.8 Emerging Issues in MANET Performance and QoS ....................................................................... 82

5.9 Conclusions & Future Scope ............................................................................................................. 83

References ................................................................................................................................................. 84

6. PUBLICATIONS .......................................................................................... 85
6.1 Accepted Papers...................................................................................... Error! Bookmark not defined.

Security Aspects & Performance Analysis of Mobile & IP Networks Page 3

You might also like