Security Aspects & Performance Analysis of Mobile & IP Networks - Contents

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

1.INTRODUCTION .............................................................................................

2. SECURITY OF IPV6-BASED NETWORKS ................................................... 4

2.1 IPv6 Overview .................................................................................................................................... 4


2.1.1 IPv6 Basic Capabilities ................................................................................................................... 5
2.1.2 Key Advantages of IPv6 ................................................................................................................. 6

2.2 IPv6 Format & Addressing Scheme .................................................................................................... 8


2.2.1 Format & Addressing scheme used by IPv6 ................................................................................... 8

2.3 Special Purpose IPv6 Addresses .......................................................................................................... 9

2.4 IPv6 Packet-Layout & Extension Headers ......................................................................................... 9

2.5 Absence of Fragmentation issues in IPv6 ......................................................................................... 11

2.6 Migration Issues.................................................................................................................................. 13

2.7 Advanced IPv6-based Protocol Mechanisms – Mobile IPv6 ........................................................... 13

2.8 Basic Operation of Mobile IPv6 ........................................................................................................ 17

2.9 Traditional Security Approaches and Mechanisms -- A brief overview ........................................ 17

2.10 IPv6 Security Mechanisms and Approaches .................................................................................. 19

2.11 Firewall Capabilities ........................................................................................................................ 23


2.11.1 Network Address Translation (NAT) ......................................................................................... 23
2.11.2 Virtual Private Network (VPN) .................................................................................................. 24
2.11.3 Demilitarized Zones (DMZ) ..................................................................................................... 24
2.11.4 Anti-spoofing ............................................................................................................................ 25
2.11.5 Firewall Types .......................................................................................................................... 25
2.11.6 Packet Filter .............................................................................................................................. 25
2.11.7 Proxy ........................................................................................................................................... 26
2.11.8 Stateful Inspection ...................................................................................................................... 26
2.11.9 Firewall Architecture ................................................................................................................ 26

2.12 IPv6 Areas of Security Concerns: Addresses ................................................................................ 27


2.12.1 IPv6 Addressing Security ........................................................................................................... 28
2.12.2 IPv6 Anycast Address Security .................................................................................................. 28
2.12.3 Documented Issues for IPv6 Security ......................................................................................... 28

2.13 Risks and Vulnerabilities ................................................................................................................. 29


2.13.1 Static Session Hijacking ............................................................................................................. 29
2.13.2 Redirection Attacks..................................................................................................................... 30
2.13.3 Denial of Service (Flooding Attacks) ......................................................................................... 31
2.13.4 Address Privacy .......................................................................................................................... 31
2.13.5 Cause Packets to Be Sent to the Attacker ................................................................................... 31
2.13.6 “Classic" Redirection Attack .................................................................................................... 32
2.13.7 Time-Shifting Attack .................................................................................................................. 32
2.13.8 Cause Packets to Be Sent to a Black Hole .................................................................................. 32
2.13.9 Third Party Denial-of-Service Attacks ....................................................................................... 32

2.14 Essential IPv6 Security Considerations .......................................................................................... 33

Security Aspects & Performance Analysis of Mobile & IP Networks Page 1


2.14.1 IPv6 Flow labels Issues............................................................................................................... 33
2.14.2 ICMPv6 Issues ........................................................................................................................... 33
2.14.3 Neighbor Discovery Issues ........................................................................................................ 34
2.14.4 Routing Headers ......................................................................................................................... 35
2.14.5 DNS Issues.................................................................................................................................. 35
2.14.6 Minimum Security Plan .............................................................................................................. 36

References: ................................................................................................................................................ 37

3. PERFORMANCE OF IPV6 AND GIGABIT NETWORKS ......................... 38

3.1 IPv6 Addressing Mechanisms ........................................................................................................... 38


3.1.1 Introduction................................................................................................................................... 38
3.1.2 Addressing Conventions ............................................................................................................... 39
3.1.3 Address Types .............................................................................................................................. 40
3.1.4 Addresses for Hosts and Routers .................................................................................................. 41

3.2 More Advanced IPv6 Protocol Mechanisms .............................................................................. 42


3.2.1 Introduction................................................................................................................................... 42
3.2.2 IPv6 and Related Protocols (Details) ............................................................................................ 42
3.2.3 IPv6 Header Format ...................................................................................................................... 43
3.2.4 IPv6 Extension Headers ................................................................................................................ 43
3.2.5 IPv6 Infrastructure ........................................................................................................................ 44
3.2.6 ICMPv6 message .......................................................................................................................... 46
3.2.7 Dynamic Host Configuration Protocol for IPv6 ........................................................................... 46
3.2.8 Neighbor Discovery for IP Version 6 (IPv6) Protocol .................................................................. 47
3.2.9 Mobile IP Version 6 (MIPv6) ..................................................................................................... 47

3.3 Performance Issues in High Speed (Gigabit) Networks .................................................................. 48


3.3.1 Introduction................................................................................................................................... 48
3.3.2. Performance & Reliability Issues ................................................................................................ 48
3.3.3 Potential Solutions & Alternatives ................................................................................................ 49
3.3.4. Conclusions.................................................................................................................................. 49

References ................................................................................................................................................. 49

4. SECURITY ASPECTS OF MOBILE ADHOC NETWORKS(MANETS) ....... 51

4.1 Fundamentals of Security in Mobile Networks ................................................................................ 51

4.2 Need for Intrusion Detection in Ad hoc Networks ........................................................................... 52

4.3 General overview of Intrusion Detection Techniques ..................................................................... 53

4.4 Unsuitability of the Current IDS techniques for Ad-Hoc paradigm .............................................. 53

4.5 Novel (proposed) architecture for IDS ............................................................................................. 54


4.5.1 Intrusion Response ........................................................................................................................ 56

4.6 Anomaly detection in mobile ad-hoc networks ................................................................................ 57


4.6.1 Detecting Abnormal Updates to Routing Tables .......................................................................... 57
4.6.2 Detecting Anomalous activities in other layers ............................................................................ 57

4.7 Detecting Intrusions as Anomalies .................................................................................................... 58


4.7.1 Conventional Intrusion Detection Systems ................................................................................... 59

Security Aspects & Performance Analysis of Mobile & IP Networks Page 2


4.8 Intrusion Detection Issues in MANETs ............................................................................................ 60

4.9 Proposed Intrusion Detection Systems(IDSs) ................................................................................... 61

4.10 Detection of Misbehaving Nodes ..................................................................................................... 65

4.11 Open Issues & Future Scope............................................................................................................ 66

4.12 Conclusions ....................................................................................................................................... 67

References ................................................................................................................................................. 68

5. PERFORMANCE OF MOBILE ADHOC NETWORKS(MANETS) ............... 68

5.1 Background ......................................................................................................................................... 69

5.2 QoS Provisioning Challenges in MANETs ....................................................................................... 70

5.3 QoS Protocol Performance Issues & Factors ................................................................................... 71

5.4 QoS Models ......................................................................................................................................... 72

5.5 QoS Signaling/Insignia ....................................................................................................................... 75

5.6 QoS Mac Protocol ............................................................................................................................... 77

5.7 QoS Routing Mechanism .................................................................................................................. 78

5.8 Emerging Issues in MANET Performance and QoS ....................................................................... 82

5.9 Conclusions & Future Scope ............................................................................................................. 83

References ................................................................................................................................................. 84

6. PUBLICATIONS .......................................................................................... 85
6.1 Accepted Papers...................................................................................... Error! Bookmark not defined.

Security Aspects & Performance Analysis of Mobile & IP Networks Page 3

You might also like