Internet Engineering Task Force (IETF) introduced IPv6 in early 90’s as a solution to the depleting address space provided by IPv4. Global Internet Assigned Numbers Authority (IANA) gave out the last block of IPv4 addresses in February 2011, making the need to move to IPv6 urgent. Today the question “why to implement IPv6?” has been reframed to “how to implement IPv6?” (Vaughan-Nichols, 2012). With more and more organizations adopting IPv6 for their network, it has now been realized that IPv6 is not just a solution to the limited address space provided by IPv4 but also a path to innovations. But with all the advantages IPv6 provides over IPv4, it is also accompanied with certain disadvantages. This paper focuses on the security issues involved with IPv6. The paper discusses some improvements in IPv6 security features compared to IPv4, new security threats faced by IPv6 and some solutions to improve IPv6 security.
INTRODUCTION
Internet Protocol version four (IPv4) was introduced by International Engineering Task Force (IETF) is 1981 via RFC 791 as a feasible solution to connect computers for communication. With a 32 bit address space covering 2^32 addresses, it was considered sufficient to provide an IP address to all users over the world. But with the requirement of IP for various technologies like sensor networks, Radio Frequency Identifiers (RFID), cell phones, home appliances, and, automobiles resulted in the depletion of the IPv4 address space (Marsan, 2011) and the emergence of IPv6 in 1995 via RFC 1885 and later RFC 2460 in 1998. IPv6 provides certain advantages over IPv4, such as larger address space, better routing table manageability, address auto-configuration, and better security features as compared to IPv4 (C...
... middle of paper ...
... al., 2009).
4. Dual stack and Tunneling: Dual stack is a more preferred mechanism for transition from IPv4 to IPv6, thus providing an organization to support applications for both IPv6 and IPv4. Also, if tunneling is implemented, it is beneficial to use static tunneling when compared to dynamic tunneling as it gives the administrator more control over the transition mechanism (Ashford, 2012).
CONCLUSION
This paper recognized the improvements in IPv6 compared to IPv4, from a security point of view. It also discussed new security threats faced by IPv6 and some measures that can be taken to improve IPv6 security. Although IPv6 provides security improvements compared to IPv4, it does not solve all security threats faced by IPv4. With the fast emergence of IPv6, it is necessary to introduce better security mechanisms that can protect IPv6 networks from security attacks.
With an IPv4 network, all the work consisting of network renumbering and assigning of new address schemes would had been done manually. Another useful feature of IPv6 is the multi-homing technique. It allows simultaneous connections which are established to two ISPs. Compared to IPv4, IPv6 has a much simpler packet header structure, which is designed to minimize the time and efforts that go in to header processing. IPv6 offers better end-to-end connectivity than its predecessor IPv4. The most exciting applications to emerge in todays world is peer-to-peer applications such as multi-player online games, video-conferencing (streaming), file sharing and
IPv6-the next version of IP, already implemented in some of the newest Internet ready devices. IPSEC and congestion control (ECN) functionality are already put into service. Increased address space will decrease the effectiveness of attacks scanning for vulnerable machines.
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
Net neutrality is an issue that has been brought up several times throughout the years but is currently resurfacing as Ajit Pai, chairman of the FCC, plans to have it repealed. Voting for this decision will take place on the 14th. Before delving too deeply into the topic, let's define net neutrality. It’s the principle that companies that connect consumers to the internet cannot block any content. They must make all content available at the same speed, meaning they can't slow the loading speed of one site over another, treating everything equally. If net neutrality is voted to be repealed, this will cause major issues for consumers in the months to come.
In order to overcome slow and error prone mitigation schemes, we need a reactive detection-assisted mitigation scheme that automatically responds to detected prefix hijacks and hence mitigates the adverse impact of the attacks in a timely fashion. An effective mitigation system works as follows [4]:
Network Address Translation (NAT) is a standard used to allow multiple PCs on a private network to share a single, globally routable IPv4 address. NAT enables a user to have a large set of addresses internally and usually one address externally. The main reason NAT is often deployed is because IPv4 addresses are getting scarce. NAT is an immediate, but temporary, solution to the IPv4 address exhaustion problem that will eventually be rendered unnecessary with the deployment of the IPv6. The Internet Engineering Task Force has been aware of the impending depletion of the current address space for almost a decade.
One resolution is for providers to organize centralized network address translators that permit ISPs to "dual-stack" new consumers with a public IPv6 address and a private IPv4 address. The other alternative is to use a protocol translator (NAT64) that allow an IPv6 only piece of equipment to talk to an IPv4-only piece of equipment. Neither techniqu...
Net Neutrality is the principle that for all the Internet users can access network content, access device and select service providers in the extent permitted by law. It means governments should be responsible for Internet service providers to treat all data on Internet as the same level. Do not charge the fee by different user, website, platform and application. In order to prevent operators controlling the data for business interest so the government set up Net Neutrality. Make sure the equality of data transmission.
Well, my day starts when I wake up from my daily nightmares about the FCC's ridiculous rollback of net neutrality laws. This move, pushed by Ajit Pai, was directly tied to the economy due to its intent: to allow ISPs the "freedom" to throttle internet traffic in such a way that certain services and companies (provided that they can pay) receive preferential and unfair treatment in the form of faster internet speeds than competitors. For example, if Netflix decides to pay Comcast for faster internet speed than Netflix's competitor Hulu, Comcast has the legal go-ahead to throttle Hulu into oblivion because no consumer is going to want to pay for laggy TV shows. Thanks, FCC.
The TCP/IP is the most important internet operation protocol in the world. While IP protocol performs the mass of the functions which is needed for the internet to work. It does not have many capabilities which are essential and needed by applications. In TCP/IP model these tasks are performed by a pair of protocols that operate at the transport layer. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). These two protocols are vital when it comes to delivering and managing the communication of numerous applications. To pass on data streams to the proper applications the Transport layer must identify the target application. First, to be able to attain this, Transport layer assigns an application an identifier. In the TCP/IP model call this identifier a port number. Every individual software process needing to access the network is assigned a un...
For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security. The internet allows people to communicate sensitive information, and if received into the wrong hands can cause many problems for that person.
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever-changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place where people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their power grids, and hold plans for nuclear devices and nuclear power. Risks to commercial and government concerns are now being noticed and many countries are taking actions to prevent such threats (McGuffin and Mitchell 1).
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
A GPS system for your motorcycle can turn your journeys, into adventures. Opening up a whole new experience, you can find amazing places to explore by planning your trips at home, and downloading your routes to your GPS device. New landscapes, destinations, and road trips await; with the security and confidence of never getting lost again.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...