Advertisement

Generation of IPv6 Addresses Based on One-to-Many Reversible Mapping Using AES

  • Nashrul HakiemEmail author
  • Akhmad Unggul Priantoro
  • Mohammad Umar Siddiqi
  • Talib Hashim Hasan
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 157)

Abstract

The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across the globe to resolve the IP address depletion problem as well as reaping the benefit of it. This research proposes a new scheme to manage IPv6 addresses in an enterprise wireless local area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In this scheme each user is assigned a dynamic IPv6 address that is generated cryptographically. Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. In this way, it is possible for the network administrator to identify users in real time from their IPv6 address although a user’s IP address regularly changed. Dynamically changing IP address will impede an external network adversary’s effort to track user’s online behavior, thus enhancing privacy.

Keywords

Address Management Advanced Encryption Standard Cipher Feedback DHCPv6 IPv6 WLAN 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    IETF, Privacy Extensions for Stateless Address Autoconfiguration in IPv6, in RFC 4941. Network Working Group (2007)Google Scholar
  2. 2.
    Amoss, J.J., Minoli, D.: Handbook of IPv4 to IPv6 Transition, Methodologies for Institutional and Corporte Networks. Auerbach Publications, Danvers (2008)Google Scholar
  3. 3.
    IETF, IPv6 Stateless Address Autoconfiguration, in RFC 4862. Network Working Group (2007)Google Scholar
  4. 4.
    IETF, Cryptographically Generated Addresses (CGA), in RFC 3972. Network Working Group (2005)Google Scholar
  5. 5.
    Kempf, J., Wood, J., Ramzan, Z., Gentry, C.: IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 196–211. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). SIGCOMM Comput. Commun. Rev. 31(2), 4–8 (2001)CrossRefGoogle Scholar
  7. 7.
    IETF, Applying Cryptographically Generated Addresses and Credit-Based Authorization to Mobile IPv6, in Internet-Draft draft-arkko-mipshop-cga-cba-03.txt. Network Working Group (2006)Google Scholar
  8. 8.
    IETF, Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs), in RFC 4982. Network Working Group (2007)Google Scholar
  9. 9.
    IETF, Dynamic Host Configuration Protocol for IPv6 (DHCPv6), in RFC 3315. Network Working Group (2003)Google Scholar
  10. 10.
    IETF, Interactions between CGA and DHCPv6. Network Working Group (2007)Google Scholar
  11. 11.
    Hakiem, N., Priantoro, A.U., Siddiqi, M.U., Hasan, T.H.: IPv6 multi generated address for enterprise wireless Local Area Network. In: IGCES 2008, Johor Malaysia (2008)Google Scholar
  12. 12.
    Musa, M., Schaefer, E.F., Wedig, S.: A Simplified Rijndael Algorithm And Its Linear And Differential Cryptanalyses. Santa Clara University, Santa Clara (2002)Google Scholar
  13. 13.
    Hakiem, N., Priantoro, A.U., Siddiqi, M.U., Hasan, T.H.: Generation of cryptographic one-to-many mapping IPv6 address using S-AES. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), Jakarta Indonesia (2010)Google Scholar
  14. 14.
    Davod, M.S., Khaleghei, B.H.: On the vulnerability of Simplified AES Algorithm Against Linear Cryptanalysis. IJCSNS International Journal of Computer Science and Network Security 7(7) (2007)Google Scholar
  15. 15.
    Stallings, W.: Cryptography and Network Security, Principles and Practices, 4th edn. Pearson Prentice Hall (2006)Google Scholar
  16. 16.
    Richard, M.: 10 Future Web Trends (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Nashrul Hakiem
    • 1
    Email author
  • Akhmad Unggul Priantoro
    • 1
  • Mohammad Umar Siddiqi
    • 1
  • Talib Hashim Hasan
    • 1
  1. 1.Faculty of EngineeringInternational Islamic University MalaysiaKuala LumpurMalaysia

Personalised recommendations