Generation of IPv6 addresses based on one-to-many reversible mapping using AES
The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across...
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English English |
Published: |
Springer-Verlag
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/28295/ http://irep.iium.edu.my/28295/ http://irep.iium.edu.my/28295/ http://irep.iium.edu.my/28295/1/Springer_-_2012_-_Generation_of_IPv6_Addresses_Based_on_-_pp_183-189.pdf http://irep.iium.edu.my/28295/2/Recent_Progress_in_DEIT_Front_Cover.pdf |
Summary: | The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across the globe to resolve the IP address depletion problem as well as reaping the benefit of it. This research proposes a new scheme to manage IPv6 addresses in an enterprise wireless local area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In this scheme each user is assigned a dynamic IPv6 address that is generated cryptographically. Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. In this way, it is possible for the network administrator to identify users in real time from their IPv6 address although a user’s IP address regularly changed. Dynamically changing IP address will impede an external network adversary’s effort to track user’s online behavior, thus enhancing privacy. |
---|