Implementation of IPv6 Security in Linux
#1

Implementation of IPv6 Security in Linux

The TCP/IP protocol suite has a number of security loopholes of serious concern. Efforts are on by the IETF to address security issues in both IP and IPv6 protocols and to standardize the security mechanisms. Two security extension headers, AH for authentication and ESP for confidentiality, have been proposed. Support for security headers is a mandatory part of every IPv6 implementation. In this thesis we describe an experimental implementation of these security protocols for IPv6 in Linux. An implementation of PF_KEY interface for key management applications and a simple extension of BSD Socket API for security are also described. A conceptual description of the security protocols are presented in the form of a small tutorial.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: linux ipv6 tunnel, process migration implementation in linux, ipv6 dns server configuration in linux, linux kernel ipv6, ping ipv6 linux, linux ipv6 disable, implementation of ipv6,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing Security: From Single to Multi-Clouds 1 824 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,340 16-03-2015, 02:52 PM
Last Post: seminar report asees
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,537 10-01-2015, 11:13 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,249 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,685 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,658 29-07-2013, 11:09 AM
Last Post: computer topic
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 3,002 15-04-2013, 11:14 AM
Last Post: computer topic
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,753 04-02-2013, 04:49 PM
Last Post: seminar details
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,298 02-02-2013, 02:08 PM
Last Post: seminar details

Forum Jump: