Trusted Node-Based Algorithm to Secure Home Agent NATed IPv4 Network from IPv6 Routing Header Attacks

Mohamed Shenify


Providing a secure mobile communication in mixed IPv4/IPv6 networks is a challenging task. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be exploited by attackers to bypass the security. This paper discusses an algorithm to secure home agent network from the routing header vulnerability, where the home agent network uses IPv4 Network Address Translation (NAT) router. The algorithm also takes into account multi-hops destination in the routing header. Verification was done through implementation of the algorithm at the Home Agent modul in a testbed network. The experimental results show that the proposed algorithm provides secure communication between Correspondent nodes and Mobile Nodes that moved into the NATed network without causing a significance filtering delay.

Full Text:



Ahmadi, S.M. Analysis Towards Mobile IPv4 and Mobile IPv6 in Computer Networks. International Journal of Intelligent Systems and Applications (IJISA), 2012, 4(4), 33-51.

Hong, L. X. The Research of Network Transitional Technology from IPv4 to IPv6. Proceedings of the 4th IEEE International Conference on Digital Manufacturing and Automation (ICDMA). Shandong. 2013:1507-1509.

Lee, K.-H., Jung, H.-K., Lee, H.-W., Lee, S.-K. & Han, Y.-H. A Network-Based IP Mobility Management Scheme with IPv4/IPv6 Dual Stack Support. In: H-K Jung et. al. Editors. Lecture Notes in Electrical Engineering: Future Information Communication Technology and Applications (ICFICE 2013). Berlin:Springer; 2013:199-216.

Durdağı, E., & Buldu, A. IPv4/IPv6 Security and Threat Comparisons. Procedia-Social and Behavioral Sciences, 2010, 2(2), 5285-5291.

La Polla, M., Martinelli, F., & Sgandurra, D. A Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials, 2013, 15(1), 446 - 471.

Zagar, D., Grgic, K., & Rimac-Drlje, S. Security Aspects in IPv6 Networks-Implementation and Testing. Computers & Electrical Engineering, 2007, 33(5-6), 425-437.

Shanmugaraja, P., & Chandrasekar, S. Accessible Methods to Mitigate Security Attacks on IPv4 to IPv6 Transitions. European Journal of Scientific Research, 2012, 77(2), 165-173.

Karthikeyan, V., & Prittopaul.P. A Survey on Vulnerability of Type 0 Routing Header in IPv6. International Journal of Computer Science and Management Research, 2013, 2(2), 1671-1676.

Wadhwa, M., & Khari, M. Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol. International Journal of Computer Applications, 2011, 20(3), 35-39.

Field, A. Discovering Statistics Using SPSS. Third Edition. London: Sage Publications. 2009.

Hair, J. F., Black, W. C., Babin, B. J. & & Anderson, R. E. Multivariate Data Analysis: A Global Perspective. Seventh Edition. New Jersey: Pearson Prentice Hall. 2010.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

TELKOMNIKA Telecommunication, Computing, Electronics and Control
ISSN: 1693-6930, e-ISSN: 2302-9293
Universitas Ahmad Dahlan, 4th Campus
Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191
Phone: +62 (274) 563515, 511830, 379418, 371120
Fax: +62 274 564604