An Integrated Secure Architecture for IPv4/IPv6 Address Translation Between IPv4 and IPv6 Networks
An All-IP network is probably getting highly feasible since all applications and services in the telecommunication are already getting IP enabled. Internet Protocol version 6 or IPv6 is a later version of IP suite as it is designed to handle the increasing number of Internet applications. Security has become a major concern for the IP next generation network architecture and is considered as one of the most fundamental requirements for business continuity and service delivery. Several initiatives have been made by researchers to integrate secure IPv4/IPv6 address translation between IPv4 and IPv6 networks. But, not much progress has been reported in the recent past. Hence, in this research, an Integrated Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks, with an IPv4/IPv6-Enabled Gateway Translator (IP46EGT), has been proposed to achieve MAC-level, VPN-IPSec, and Certificate level security. Network performance is evaluated and the generated results are tabulated and graphically presented.
KeywordsIPv4 IPv6 Address translation Security IPSec
Cryptographically Generated Address—an address generated by replacing the 64-bit interface identifier of an IPv6 address with the cryptographic hash of the address owner’s public key.
IPv4/IPv6-Enabled Gateway Translator which translates IPv4 address into IPv6 address and IPv6 address into IPv4 address.
A load balancer is a device which distributes network traffic or application traffic across a number of servers.
Media Access Control address is a hardware address that uniquely identifies each node of a network.
It is the time required for a packet to travel from a source node to a destination node and the time taken for an acknowledgment to be received.
It is used to secure site-to-site connectivity and protects IPv4 and IPv6 traffic as it communicates between end hosts or security gateways.
- 1.Abu, T.Z., Taha, Z., Syed, Z.: Deploying IPv6: Security and Future. International Journal of advanced studies in Computer Science and Engineering(IJASCSE), vol. 3 (2014)Google Scholar
- 2.Juniper Networks: An IPv6 Security Guide for U.S. Government Agencies. The IPv6 World Report Series, vol. 4 (2008)Google Scholar
- 3.Huiping, S., Junde, S., Zhong, C.: Survey of Authentication in Mobile IPv6 Network. In: IEEE CCNC Proceedings (2010)Google Scholar
- 4.Hero, M., Amirhossein, M., Hassan, K., Rosli, S.: Protection of Binding Update Message in Mobile IPv6. In: IEEE UKSim-AMSS 6th European Modelling Symposium (2012)Google Scholar
- 5.Yvette, E.G., Ronnie, D.C., Byungjoo, P.: A robust secured Mobile IPv6 mechanism for multimedia convergence services. Int. J. Multimedia Ubiquitous Eng. 6(4) (2011)Google Scholar
- 6.Frederic, B., Olivier, F., Isabelle, C., Ralph, D.: Automated and secure IPv6 configuration in enterprise networks. In: IEEE International Conference on Network and Service Management CNSM (2010)Google Scholar
- 7.Nazrul, M.A., Asrul, H.Y.: End to End IPSec Support across IPv4/IPv6 Translation Gateway. In: IEEE Second International Conference on Network Applications, Protocols and Services (2010)Google Scholar
- 8.Seewald, M.G.: Benefits of end-to-end IP for cyber and physical security. IEEE (2012)Google Scholar
- 9.Serap, A., Marcelo, M.: Challenges for the security analysis of next generation networks. Elsevier (2010)Google Scholar
- 10.Mahdi, A., Glenford, M., Aboubaker Raphael, P.: Providing Security in 4G Systems: Unveiling the Challenges. IEEE (2010)Google Scholar
- 11.Faisal, A.H., Chan, Y.Y., Khaled, S.: Secure framework for the return routability procedure in MIPv6. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (2013)Google Scholar
- 12.Pekka, N., Andrei, G., Thomas, R.H.: Host Identity Protocol (HIP):Connectivity Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks. IEEE(2010)Google Scholar
- 13.Abdur, R.C., Alan, S.: Securing IPv6 Network Infrastructure: A New Security Model. IEEE (2010)Google Scholar