International Journal of Computer Science and Mobile Computing An Enhanced Security for TCP/IP Protocol Suite (original) (raw)
— Network and internet applications are growing rapidly in the recent past. These applications are used by thousands of users and controlled by different administrative entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however originally designed for research and educational purpose, not for commercial applications. So internet was not designed with security in mind. As the internet grows the existing security framework was not adequate for modern day applications. The main reason was due to the lack of security services in the TCP/IP Protocol Suite. The lack of authentication mechanism of TCP/IP Protocol Suite is mainly due to the poor protection mechanism of packets and broadcast nature of the lower layer protocols. Moreover there is no protection for the application layer of the network model. This paper presents the proposed security architecture for the TCP/IP Protocol Suite. I. INTRODUCTION This work aims to investigate a large number of security approaches adopted in the TCP/IP Protocol Suite and to propose a new architecture for the existing model. The first contribution of this work was to provide the security for applications of the application layer protocols Second aspect of the work was to enhance the security for the internet control message protocol which is one of the main protocols that was used by the network managers for troubleshooting the networks. The third and very important aspect of this research was to provide the security for Real Time Applications. The Internet today is being used by billions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. [1] pointed out that Internet is mainly used as an efficient means for communication, entertainment and education. There is a need for protecting confidential data because of the rapid growth of Internet. The current version of IP Protocol namely IPv6 comes with built in security mechanism called IPSec [2]. IPSec provides security services at the IP layer by enabling a system to select required security protocols to determine the cryptographic algorithms to use for the services and put in place of any cryptographic keys required to provide the security services. But IPSec do not provide any security for applications in application layer. Internet Control Message Protocol attacks is still possible which a major setback of IPv6. The usage of current version of Internet and TCP/IP Suite results in many flaws such as: Spoofing is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Repudiation is the ability of users to deny that they performed specific actions
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
IP SECURITY ARCHITECTURE, APPLICATION, ASSOCIATED DATABASE, AND MODE
IJRAR - International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, Volume.1, Issue 1, Page No pp.446-453, January-2014, 2014