Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance a...

Full description

Saved in:
Bibliographic Details
Main Authors: Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal
Format: Article
Language:English
Published: MDPI AG 2024-10-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/8/4/49
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846105114234847232
author Zeeshan Ashraf
Adnan Sohail
Muddesar Iqbal
author_facet Zeeshan Ashraf
Adnan Sohail
Muddesar Iqbal
author_sort Zeeshan Ashraf
collection DOAJ
description After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. In an MITM attack, the attacker secretly captures the data, masquerades as the original sender, and sends it toward the receiver. The receiver replies to the attacker because the receiver does not authenticate the source. Therefore, the authentication between two parties is compromised due to an MITM attack. The existing authentication schemes adopt complicated mathematical procedures. Therefore, the existing schemes increase computation and communication costs. This paper proposes a lightweight and authentic end-to-end communication model to detect MITM attacks using a pre-shared symmetric key. In addition, we implement and analyze the performance of our proposed security model on Linux-based virtual machines connected to large-scale hybrid IPv4-IPv6 virtual networks. Moreover, security analyses prove the effectiveness of our proposed model. Finally, we compare the performance of our proposed security model with existing models in terms of computation cost and communication overhead.
format Article
id doaj-art-14584befaa07493fb6c095d7000e7d82
institution Kabale University
issn 2410-387X
language English
publishDate 2024-10-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj-art-14584befaa07493fb6c095d7000e7d822024-12-27T14:19:33ZengMDPI AGCryptography2410-387X2024-10-01844910.3390/cryptography8040049Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM AttacksZeeshan Ashraf0Adnan Sohail1Muddesar Iqbal2Department of Computer Science & Software Engineering, Grand Asian University, Sialkot 51040, PakistanDepartment of Computing & Technology, IQRA University, Islamabad Campus, Islamabad 44310, PakistanSmart Systems Lab, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi ArabiaAfter the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. In an MITM attack, the attacker secretly captures the data, masquerades as the original sender, and sends it toward the receiver. The receiver replies to the attacker because the receiver does not authenticate the source. Therefore, the authentication between two parties is compromised due to an MITM attack. The existing authentication schemes adopt complicated mathematical procedures. Therefore, the existing schemes increase computation and communication costs. This paper proposes a lightweight and authentic end-to-end communication model to detect MITM attacks using a pre-shared symmetric key. In addition, we implement and analyze the performance of our proposed security model on Linux-based virtual machines connected to large-scale hybrid IPv4-IPv6 virtual networks. Moreover, security analyses prove the effectiveness of our proposed model. Finally, we compare the performance of our proposed security model with existing models in terms of computation cost and communication overhead.https://www.mdpi.com/2410-387X/8/4/49authenticationhybrid IPv4-IPv6 networkIoEkey exchangevirtualizationsecurity services
spellingShingle Zeeshan Ashraf
Adnan Sohail
Muddesar Iqbal
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
Cryptography
authentication
hybrid IPv4-IPv6 network
IoE
key exchange
virtualization
security services
title Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
title_full Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
title_fullStr Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
title_full_unstemmed Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
title_short Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
title_sort design and performance evaluation of an authentic end to end communication model on large scale hybrid ipv4 ipv6 virtual networks to detect mitm attacks
topic authentication
hybrid IPv4-IPv6 network
IoE
key exchange
virtualization
security services
url https://www.mdpi.com/2410-387X/8/4/49
work_keys_str_mv AT zeeshanashraf designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks
AT adnansohail designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks
AT muddesariqbal designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks