Looking for a similar answer, essay, or assessment help services?

Simply fill out the order form with your paper’s instructions in a few easy steps. This quick process ensures you’ll be matched with an expert writer who
Can meet your papers' specific grading rubric needs. Find the best write my essay assistance for your assignments- Affordable, plagiarism-free, and on time!

Posted: August 14th, 2022

Architecture for Secure IPv4/IPv6 Address Translation

An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks

  • Amutha J, Meenakshi Sundaram R, Albert Rabara S3

 

Which Citation Styles Can You Handle?

We get a lot of “Can you do MLA or APA?”—and yes, we can! Our writers ace every style—APA, MLA, Turabian, you name it. Tell us your preference, and we’ll format it flawlessly.

Abstract. An All-IP network is probably getting highly feasible since all applications and services in the telecommunication are already getting IP enabled. Internet Protocol version 6 or IPv6, is a later version of IP suite as it is designed to handle the increasing number of Internet applications. Security has become a major concern for the IP next generation network architecture and is considered as one of the most fundamental requirements for business continuity and service delivery. Several initiatives have been made by researchers to integrate secure IPv4/IPv6 address translation between IPv4 and IPv6 networks. But, not much progress has been reported in recent past. Hence, in this research, An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks, with an IPv4/IPv6 Enabled Gateway Translator (IP46EGT) has been proposed to achieve MAC-level, VPN-IPSec and Certificate level security. Network performance is evaluated and the generated results are tabulated and graphically presented.

Keywords: IPv4, IPv6, Address Translation, Security, IPSec.

1 Introduction

The next generation Internet Protocol, IPv6 is intended to replace IPv4, which is gaining popularity now-a-day and exists sparsely in today’s world. Though IPv6 contains built-in IPSec security protocol, the initiation of IPv6 makes changes in the security field and transition from IPv4 creates new risks and weakens the security strategies of an organization. IPv6 is enmeshed with various issues: its global interoperability is limited due to the weakness of the encryption algorithm, IPSec has not yet been fully standardized and there is no protection against Denial of Service/Flooding attacks [1]. One of the core issues with IP security exists today is that it is an “add-on” and was not built-in from the start, in which the core functionality is developed first, which then satisfies the needs of security requirements. It tends to create a problem because IP is becoming ubiquitous form of communication that affects the entire enterprise [2].

Are Writing Services Legal?

Totally! They’re a legit resource for sample papers to guide your work. Use them to learn structure, boost skills, and ace your grades—ethical and within the rules.

IPSec protocol suite, as an extension to the basic IP Protocol, provides confidentiality, authentication service and overcomes the security problems caused by the mobility between the mobile node and the home agent [3]. IPSec is compatible with current Internet standards in IPv4. But in IPv6, IPSec is defined as mandatory feature and the objective of improved security is to create routing changes that provide both mobility in the network and safety against various security threats [4].

To prevent the attacker from establishing false connections and to ensure the integrity of the mobile node and its peers, security in the proposed architecture guarantees data origin authentication of IP packets through Cryptographically Generated Address (CGA), while securing binding update message between the mobile node, home agent and the correspondent node. Hence, in this research, an Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks, with an IPv4/IPv6 Enabled Gateway Translator (IP46EGT) has been proposed to achieve various levels of security namely MAC-Level Security, VPN-IPSec Security and Certificate level security. Network performance is evaluated and the generated results are tabulated and graphically presented.

2 Review of Literature

What’s the Price for a Paper?

Starts at $10/page for undergrad, up to $21 for pro-level. Deadlines (3 hours to 14 days) and add-ons like VIP support adjust the cost. Discounts kick in at $500+—save more with big orders!

Frederic et al. [5] advocated various algorithms and tools which ensure the security configuration of the firewalls, and for the generation of the IPv6 addressing scheme in and for an IPv4 enterprise network, in which the firewalls deployed are stateful. A new model was suggested by Nazrul et al. [6] in the form of a new Internet Key Exchange (IKE) authentication in order to ensure end to end IPSec interoperability across translation gateway. This model uses Address Based Keys (ABK) with certificateless signature for securing the communication channel between end nodes by using their end IP addresses as public / secret keys for authentication which eliminates the notification of the revoked keys. Seewald [7] proposed an architecture for NGN which provided flexibility, interoperability and built-in security technologies (IPSec). Serap et.al. [8] proposed an autonomic and self-adaptive systems which integrates the NGN architecture with the ITU-T security model for assuring the security of NGNs and new additional features enabling it to dynamically detect vulnerabilities, threats and risk analyses. Mahdi et. al. [9] presented an integrity security open architecture model for NGN based on the concepts of an Integrated Security Module (ISM) to protect data and Targeted Security Models (TSMs) to protect entities, users, servers and resources. The protocol used in this model provides only the network-level security and the functionality of this set of protocols is only related to the infrastructure layer of the X.805 standard which is concerned with the security of network links and elements.

3 Proposed Architecture

The proposed unique architecture is designed to integrate the two independent IP versions IPv4 and IPv6, by mutually permitting one version of IP mobile nodes to communicate with another version of IP networks. Therefore IPv4 networks communicate with IPv6 mobile nodes, and IPv6 networks communicate with IPv4 mobile nodes. This is achieved by designing a novel translator namely an IPv4/IPv6 Enabled Gateway Translator (IP46EGT) which is simulated in the form of a PC-Emulator. The IP46EGT translates IPv4 address into IPv6 address and IPv6 address into IPv4 address. When an IPv6 node communicates with an IPv4 host in the IPv4 network, the translated IPv6 source prefix is configured in the IP46EGT which detects the destination address of the IPv6 packet. If this prefix is the same as the configured prefix, the address mapping takes place and converts the IPv6 address to IPv4 address. Fig.1 represents the proposed Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks.

Fig. 1. Proposed architecture for secure IPv4/IPv6 Address Translation between

IPv4 and IPv6 Networks

Three various levels of security namely MAC level security, VPN-IPSec security and Certificate Level security is incorporated in the proposed architecture which provides data integrity, data confidentiality, data origin authentication and replay attacks. Virtual Private Network (VPN) is incorporated in the proposed architecture to provide secure data transmission between the VPN mobile node and the network. These systems ensure that only authenticated users can access the network and the data cannot be intercepted. The PC-Emulator in the architecture generates a New Secret Key (NSKG) which is the Cryptographically Generated Address (CGA) for every communication. Load balancer balances traffic over multiple connections, which ensures the availability of the network and improves the overall performance of the availability of the applications.

Level 1: MAC-Level Security

Is AI Involved in Writing?

Nope—all human, all the time. Our writers are pros with real degrees, crafting unique papers with expertise AI can’t replicate, checked for originality.

MAC (Media Access Control) level security is used in the proposed architecture because of its unique identifier assigned to a network interface for communications on the physical network. The source node used for communication consists of a MAC address as the source public key (SPuk), which generates a New Secret Private Key (NSKG) as the Cryptographically Generated Private Address (CGPrA) for every communication. The NSKG is a combination of the four-digit random number (SKG) and the last two bit positions of the source client node MAC address (MSKG) that is, NSKG = SKG + MSKG. The NSKG is sent to the source and destination to establish an authentication between the mobile node and the server which provides the end-to-end security.

Level 2: VPN-IPSec Security

Virtual Private Network (VPN) is incorporated in the proposed architecture to provide secure data transmission between the VPN mobile node and the network. These systems ensure that only authenticated users can access the network and the data cannot be intercepted. VPN-IPSec permits highly secure site-to-site connectivity and protects IPv4 and IPv6 traffic as it communicates between end hosts or security gateways. Packets sent by an attacker are dropped by VPN-IPSec enabled hosts which provides connectionless integrity and authentication.

Level 3: Certificate Level Security

Why Are You the Best for Research?

Our writers are degree-holding pros who tackle any topic with skill. We ensure quality with top tools and offer revisions—perfect papers, even under pressure.

To obtain a certificate, a private secret key (NSKG) based on the public key (SPuK) is generated from the Level-1 security. A certificate is created by binding the public and the private key and the payload is passed to the Certificate Server to verify that the information is valid or not. If valid, a secured connection is established between the end-users and the translation between the source and the destination happens. If not, the connection will not be established and the translation process fails.

3.1 Proposed Addressing Concept

IPv4 addresses use 32-bit and IPv6 addresses use 128‐bit identifiers. The type of an IPv6 address is identified by the high-order bits of the address. IPv4‐compatible IPv6 address and IPv4‐mapped IPv6 addressing concept is used in the proposed architecture to represent the IPv6 address and IPv4 address respectively. Hence, in the proposed addressing architecture, in order to promote IPv4 and IPv6 translation, the IPv6 global unicast address is modified and used. For the IPv4-mapped IPv6 address, the most significant 16 bits, from 1st to 16th bit are assigned with the format prefix 2001. The address format for IPv6 in IPv4 visited network represents the IPv4-mapped IPv6 address in which the 17th to 32nd bits are assigned FFFF. The next 32 bits, from 33rd to 64th represents the 32-bit IPv4 router address. The least significant 64 bits from 65th to 128th are assigned with Interface Identifier (ID) by the cryptographically generated address. For the IPv4-compatible IPv6 address, the IP46EGT extracts the 32-bits from the 33rd to 64th bit position of the network part of the IPv6 address and converts then to its corresponding IPv4 address. The remaining bit positions are assigned with zeroes representing IPv4-compatible IPv6 address.

3.2 Proposed Interface Design

Who Writes My Assignments?

Experts with degrees—many rocking Master’s or higher—who’ve crushed our rigorous tests in their fields and academic writing. They’re student-savvy pros, ready to nail your essay with precision, blending teamwork with you to match your vision perfectly. Whether it’s a tricky topic or a tight deadline, they’ve got the skills to make it shine.

An Interface is designed for the proposed secure architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks and is presented below.

Procedure PCEmulator

Begin

{

Will My Paper Be Unique?

Guaranteed—100%! We write every piece from scratch—no AI, no copying—just fresh, well-researched work with proper citations, crafted by real experts. You can grab a plagiarism report to see it’s 95%+ original, giving you total peace of mind it’s one-of-a-kind and ready to impress.

If Request_from_MNv6_IPv4RouterAddr_Solicitation_ (Rv4_Addr) then

{

Response_Request_from_MNv6_IPv4RouterAddr_Solicitation_ (Rv4_Addr);

}// End of If

Can You Use Any Citation Format?

Yep—APA, Chicago, Harvard, MLA, Turabian, you name it! Our writers customize every detail to fit your assignment’s needs, ensuring it meets academic standards down to the last footnote or bibliography entry. They’re pros at making your paper look sharp and compliant, no matter the style guide.

{ //Key Generation

Secret_Key_Gen()

{

SKG=Random_No_Gen();// 4-digit Random Number Generation

Can I Change My Order Details?

For sure—you’re not locked in! Chat with your writer anytime through our handy system to update instructions, tweak the focus, or toss in new specifics, and they’ll adjust on the fly, even if they’re mid-draft. It’s all about keeping your paper exactly how you want it, hassle-free.

MSKG=Get_MAC_ID(PE_MAC,15,17)

NSKG = SKG +MSKG; // Generation of key

Key_Exchange()

{

How Do I Order a Paper?

It’s a breeze—submit your order online with a few clicks, then track progress with drafts as your writer brings it to life. Once it’s ready, download it from your account, review it, and release payment only when you’re totally satisfied—easy, affordable help whenever you need it. Plus, you can reach out to support 24/7 if you’ve got questions along the way!

Key_Exchange(SRC, DST, NSKG)

{

PE=NSKG;

NSKG-> Send_to_SRC;

How Quick Can You Write?

Need it fast? We can whip up a top-quality paper in 24 hours—fully researched and polished, no corners cut. Just pick your deadline when you order, and we’ll hustle to make it happen, even for those nail-biting, last-minute turnarounds you didn’t see coming.

NSKG-> Send_to_DST;

}

{

V6Bdd(1-16)FP(2001);

V6Bdd(17-32)  MA(FFFF) ;

Can You Handle Tough Topics?

Absolutely—bring it on! Our writers, many with advanced degrees like Master’s or PhDs, thrive on challenges and dive deep into any subject, from obscure history to cutting-edge science. They’ll craft a standout paper with thorough research and clear writing, tailored to wow your professor.

V6Bdd(33-64)  Decimal_to_Hexadecimal(46);

V6Bdd(65-128)  MAC address;

V6CGBdd = V6Bdd+ NSKG;

IPv6AP  V6CGBdd + HAv6

}

How Do You Match Professor Expectations?

We follow your rubric to a T—structure, evidence, tone. Editors refine it, ensuring it’s polished and ready to impress your prof.

If Request_from_MNv4_IPv6RouterAddr_ Solicitation_(Rv6_Addr) then

{

Response_Request_from_MNv4_IPv6RouterAddr_ Solicitation_(Rv6_Addr);

}// End of If

How Do You Edit My Work?

Send us your draft and goals—our editors enhance clarity, fix errors, and keep your style. You’ll get a pro-level paper fast.

{

V4Bdd(1-32)  CA(0000) ;

V4Bdd(33-64)  Hexadecimal_to_Decimal(64);

V4CGBdd = V4Bdd+ NSKG;

IPv4AP V4CGBdd + HAv4

Can You Brainstorm Topics?

Yep! We’ll suggest ideas tailored to your field—engaging and manageable. Pick one, and we’ll build it into a killer paper.

}

If (Successful(DAD) then

{

// Performs Registration_process and communication

// between IPv4 and IPv6 nodes takes place

}

} // End of If

Do You Offer Fast Edits?

Yes! Need a quick fix? Our editors can polish your paper in hours—perfect for tight deadlines and top grades.

End; // End of Begin

4 Experimental Study

The main focus of the experimental study is to test the functionality of the IPv4/IPv6 address translation architecture with respect security between IPv4 and IPv6 nodes and to measure the performance of these mechanisms on a network. The testing process is carried out in the lab environment using a virtual topology. The performance of the proposed system is investigated in terms of packet reachability, round trip latency of ping packet using a security enabled translator. The results of the study are tabulated and presented graphically.

5 Performance Analysis

5.1 Packet Reachability of Ping packets

Packet Reachability of ping packets is calculated varying in size from 64 bytes to 1440 bytes (64, 128, 256, 512, 1024, 1440). Table 1 shows the packet reachability of ping packets. The columns labeled PR-T and PR-TS shows the packet reachability using the translator and the security enabled translator respectively.

Can You Start With an Outline?

Sure! We’ll sketch an outline for your approval first, ensuring the paper’s direction is spot-on before we write.

Table 1. Packet Reachability of ping packets

Packet size

(bytes)

PR-TS

(microseconds)

PR-T

(microseconds)

64

Can You Add Charts or Stats?

Definitely! Our writers can include data analysis or visuals—charts, graphs—making your paper sharp and evidence-rich.

27

20

128

30

23

256

32

25

512

32

What About Multi-Part Projects?

We’ve got it—each section delivered on time, cohesive and high-quality. We’ll manage the whole journey for you.

25

1024

37

30

1440

Do You Adapt to International Rules?

Yes! UK, US, or Aussie standards—we’ll tailor your paper to fit your school’s norms perfectly.

47

37

Fig.2 depicts the packet reachability of ping packets in which X-axis in the graph represents the packet size in bytes and the Y-axis represents the time interval in microseconds. From the graph, it is observed that the reachability of ping packets using the security-enabled translator (PR-TS) is a little high, when compared to the reachability of packets without security.

5.2 Round-Trip Latency using security enabled translator

The round-trip latency between IPv4 and IPv6 with security enabled translator is tabulated in Table 2. The columns labeled IPv4-IPv6 and IPv6-IPv4 shows the latency between two machines communicating directly observed to be normal as expected. The columns labeled RTL-S show the round-trip latency with security enabled translator.

What does a complex assignment mean?

If your assignment needs a writer with some niche know-how, we call it complex. For these, we tap into our pool of narrow-field specialists, who charge a bit more than our standard writers. That means we might add up to 20% to your original order price. Subjects like finance, architecture, engineering, IT, chemistry, physics, and a few others fall into this bucket—you’ll see a little note about it under the discipline field when you’re filling out the form. If you pick “Other” as your discipline, our support team will take a look too. If they think it’s tricky, that same 20% bump might apply. We’ll keep you in the loop either way!

Fig. 2. Packet Reachability of ping packets

Fig. 3 represents the communication between the IPv4 and IPv6 nodes with security enabled translator, in which the X-axis in the graph represents the packet size in bytes and Y-axis represents the time interval in microseconds. It is observed that the communication from IPv6 to IPv4 is faster than IPv4 to IPv6 communication with the security enabled translator.

Fig. 3. Round-Trip Latency using security enabled translator

Table 2. Round-Trip Latency using security enabled translator

Packet size

(bytes)

IPv4-IPv6

(microseconds)

IPv6-IPv4

(microseconds)

IPv4-IPv6

(RTL-S)

(microseconds)

IPv6-IPv4

(RTL-S)

(microseconds)

64

266

244

306

281

128

282

261

334

308

256

327

295

394

347

512

374

360

451

426

1024

587

572

676

651

1440

708

676

808

768

5 Conclusion

Security has become a very important issue for the communication between IPv4 and IPv6 networks. Hence, three various levels of security namely MAC level security, VPN-IPSec security and Certificate Level security are incorporated in the proposed architecture which provides data integrity, data confidentiality, data origin authentication and thereby end-to-end secure communication is achieved. Packets sent by an attacker are dropped by VPN-IPSec enabled hosts which provides connectionless integrity and authentication. The proposed architecture is tested and the results are tabulated and graphically presented.

References

[1] Abu Taha Zamani, Syed Zubair: Deploying IPv6: Security and Future. International Journal of advanced studies in Computer Science and Engineering( IJASCSE ), vol. 3, No. 4 (2014)

[2] Juniper Networks: An IPv6 Security Guide for U.S. Government Agencies. The IPv6 World Report Series. vol. 4 (2008)

[3] Huiping Sun, Junde Song, Zhong Chen: Survey of Authentication in Mobile IPv6 Network. IEEE CCNC proceedings (2010)

[4] Hero Modares, Amirhossein Moravejosharieh, Hassan Keshavarz, Rosli Salleh:Protection of Binding Update Message in Mobile IPv6. IEEE UKSim-AMSS 6th European Modelling Symposium (2012)

[5] Frederic Beck, Olivier Festor, Isabelle Chrisment, Ralph Droms:Automated and Secure IPv6 Configuration in Enterprise Networks. IEEE International Conference on Network and Service Management – CNSM (2010).

[6] Nazrul M. Ahmad and Asrul H. Yaacob: End to End IPSec Support across IPv4/IPv6 Translation Gateway. IEEE Second International Conference on Network Applications, Protocols and Services (2010)

[7] Seewald M. G.: Benefits of end-to-end IP for cyber and physical security. IEEE (2012)

[8] Serap Atay, Marcelo Masera: Challenges for the security analysis of Next Generation Networks. Elsevier (2010)

[9] Mahdi Aiash, Glenford Mapp, Aboubaker, Raphael Phan: Providing Security in 4G Systems: Unveiling the Challenges. IEEE(2010)

Tags: Best Essay Writing Website for PhD Essays, Cheap Dissertation Writer USA and UK, Custom Essay and Assignment Writing Australia, Doctoral Dissertation Writing Service China

Order|Paper Discounts

Why Choose Essay Bishops?

You Want The Best Grades and That’s What We Deliver

Top Essay Writers

Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.

Affordable Prices

We offer the lowest possible pricing for each research paper while still providing the best writers;no compromise on quality. Our costs are fair and reasonable to college students compared to other custom writing services.

100% Plagiarism-Free

You’ll never get a paper from us with plagiarism or that robotic AI feel. We carefully research, write, cite and check every final draft before sending it your way.