IPng and the TCP/IP protocols: implementing the next generation Internet
IPng and the TCP/IP protocols: implementing the next generation Internet
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Internet and Intranet Security
Internet and Intranet Security
Authentication Systems for Secure Networks
Authentication Systems for Secure Networks
Computer
A mobile agent infrastructure for the mobility support
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 2
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor
Proceedings of the 39th annual Design Automation Conference
An Open Secure Mobile Agent Framework for SystemsManagement
Journal of Network and Systems Management
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
An extensible AAA infrastructure for IPv6
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 4.12 |
Internet Protocol, version 6, was conceived with two main goals: increase address space and improve security, relative to IPv4. The community achieved the first goal by increasing the IP address length from 32 bits to 128 bits. To meet the second goal, the Internet Engineering Task Force chartered the IP Security Working Group to design a security architecture and corresponding protocols that would provide cryptographically based security for IPv6. As work progressed, however, the IP community realized that the security architecture proposed for IPv6 could also be used for IPv4. Consequently, it extended this charter to retrofitting the security protocols, or IPsec protocols, into IPv4 implementations.Many IPv4 software vendors have announced they will support the IPsec protocols in future releases. This retrofitting is an important part of the working group's charter because IPv6 deployment is turning out to be slow. This article overviews the proposed security architecture and the two main protocolsýthe IP Security Protocol and the Internet Key Management Protocolýdescribes the risks they address, and touches on some implementation requirements.