2014
DOI: 10.3844/jcssp.2014.1344.1354
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Encapsulated Security Payload a New Mechanism to Secure Internet Protocol Version 6 Over Internet Protocol Version 4

Abstract: A considerable amount of time will be needed before each system in the Internet can convert from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). Three strategies have been proposed by the Internet Engineer Task Force (IETF) to help the transition from IPv4 to IPv6 which are dual stack, header translation and tunneling. Tunneling is used when two computers using IPv6 want to communicate with each other and the packet will travel through a region that uses IPv4. To pass through this reg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Known to cause disruption in the flow of IP packets. IP spoofing which is defined as a technique used to gain unauthorized access to computers (Hassan et al, 2014;Ahmed et al, 2012) and Denial of Service (DoS) are examples of the outcome of such attacks. When this protocol is disrupted, IP traffic is threatened.…”
Section: Introductionmentioning
confidence: 99%
“…Known to cause disruption in the flow of IP packets. IP spoofing which is defined as a technique used to gain unauthorized access to computers (Hassan et al, 2014;Ahmed et al, 2012) and Denial of Service (DoS) are examples of the outcome of such attacks. When this protocol is disrupted, IP traffic is threatened.…”
Section: Introductionmentioning
confidence: 99%