Comparative Analysis of IPv6 VPN Transition in NEMO Environments

  • Hyung-Jin Lim
  • Dong-Young Lee
  • Tai-Myoung Chung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3982)


IPv6 deployments use different NGtrans mechanisms, depending on the network situation.  Therefore, a mobile network should be able to initiate secure connectivity with the corresponding home network. The correlation between transition mechanisms used in existing network and transition mechanisms supported by the mobile network, is an important factor in secure connectivity with a corresponding home network. In this paper, VPN scenarios applicable to mobile networks during the transition to IPv6, have been analyzed. In addition, performance costs have also been evaluated, in order to establish connectivity according to VPN models with each transition phase. In addition, this paper analyzes factors affecting performance, through numeric analysis for NEMO VPN model, under an IPv6 transition environment. As shown in our study, a NEMO VPN creating hierarchical or sequential tunnels should be proposed after careful evaluation of not only security vulnerabilities but also performance requirements.


Transmission Packet Transition Mechanism Home Network Network Device Tunneling Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gilligan, R., Nordmark, E.: Transition Mechanisms for IPv6 Hosts and Routers. RFC 2893 (August 2000)Google Scholar
  2. 2.
    Ernst, T.: Nework Mobility Support Requirement. work in progress, Available at draft-ietf-nemo-requirements.txt (February 2003)Google Scholar
  3. 3.
    Ernst, T.: Network mobility in IPv6., Phd Thesis, University Joseph Fourier Grenoble, Francee (October 2001), Available at
  4. 4.
    Ernst, T.: Network Mobility Support Terminology. work in progress, available at draft-ernst-nemo-terminology.txt (November 2002)Google Scholar
  5. 5.
    Thubert, P., Molteni, M., Wetterwald, P.: IPv4 traversal for MIPv6 based Mobile Routers. work in progress, Available at draft-thubert-nemo-ipv4-traversal-01.txt (May 2003)Google Scholar
  6. 6.
    Zeadally, S., Wasseem, R., Raicu, I.: Comparison of End-System IPv6 Protocol Stacks. In: IEE Proceedings Communications, Special issue on Internet Protocols, Technology and Applications (VoIP), vol. 151(3) (June 2004)Google Scholar
  7. 7.
    Raicu, I., Zeadally, S.: Impact of IPV6 on End-user Applications. In: IEE/IEEE International Conference on Telecommunications (ICT 2003), Tahiti, Papeete, French Polynesia (February 2003)Google Scholar
  8. 8.
    Kandasamy, E., Kurup, G., Yamazaki, T.: Application Performance Analysis in Transition Mechanism from IPv4 to IPv6. In: APAN Conference, Tsukuba (February 2000)Google Scholar
  9. 9.
    Raicu, I., Zeadally, S.: Evaluating IPv4 to IPv6 Transition Mechanisms. In: IEE/IEEE International Conference on Telecommunications (ICT 2003), Tahiti, Papeete, French Polynesia (February 2003)Google Scholar
  10. 10.
    Ariga, S., Nagahashi, K., Minami, M., Esaki, H., Murai, J.: Performance Evaluation of Data Transmission using IPSec over IPv6 Networks. In: INET 2000, Yokohama (2000)Google Scholar
  11. 11.
    Lim, H.-J., Kwon, Y.-J., Chung, T.-M.: Secure VPN Performance in IP Layers. The Journal of The Korean Institute of Communication Sciences 26(11) (2001)Google Scholar
  12. 12.
    Jeffery, M., Deering, S.: Path MTU Discovery. RFC 1191 (November 1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyung-Jin Lim
    • 1
  • Dong-Young Lee
    • 1
  • Tai-Myoung Chung
    • 1
  1. 1.Internet Management Technology Laboratory and, Cemi: Center for Emergency Medical Informatics, School of Information and Communication EngineeringSungkyunkwan UniversitySuwon, Kyunggi-doRepublic of Korea

Personalised recommendations