Font Size: a A A

The Analyze And Research Of Secure Network Model Based On IPv6

Posted on:2009-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:L W WangFull Text:PDF
GTID:2178360245973012Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the networks continue to expand and scale of the ever-growing popularity of network applications, the current network protocol IPv4 exposed more and more shortcomings in the address space, network security, and other aspects. The ways of Network security threats to attack the network is also more complex, security issues become a universal impact of the Internet to further key issues.The next generation network protocol IPv6 as the nex generation Internet standard protocol came into being.IPSec will also serve as network security standards in the implementation of IPv6.IPSec provides security services for IP and upper agreement,such as the data integrity,authentication data sources,anti-replay attacks,the confidentiality of data content.Key Exchange Protocol is the focus of the entire IPSec and the basis for achieving, Key Exchange Protocol's security decides the security of whole IPSec system.The purpose of this paper is to examine how to construction security, stability of the network model based on the agreement of the IPSec in IPv6 environment to improve the security of existing networks.At frist,this paper introduced the background and significance in brief, and then more in-depth analysis of the IPv6 protocol(including IPv6 header, Address structure, Network security), IPSec Protocol (including IPSec security architecture, IPSec work model, IPSec head of the verification agreement, EncapsulatingSecurityPayload), focus on researched the Key Exchange Protocol's exchange process, analyzed its security crack.By the plan of using the trust third party mechanism and add the Key Exchange Protocol's functional module, to encrypt the stage of consultations transmit information,and achieved the purpose of improving the key exchange process's safety.Be combined with expansion header's Encapsulation Security Payload Header and Destination Option Header, build the Network security model. To testing the plan by experiment, test results show that this plan can encrypt the consultation process of IKE effectively and attackers can not analyze data structure, so achieved the expected goal.Finally summarizes the work and forecast the next step.
Keywords/Search Tags:IPv6, IPSec, IKE, Network Model, Safety Mechanism
PDF Full Text Request
Related items