Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance a...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-10-01
|
| Series: | Cryptography |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2410-387X/8/4/49 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846105114234847232 |
|---|---|
| author | Zeeshan Ashraf Adnan Sohail Muddesar Iqbal |
| author_facet | Zeeshan Ashraf Adnan Sohail Muddesar Iqbal |
| author_sort | Zeeshan Ashraf |
| collection | DOAJ |
| description | After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. In an MITM attack, the attacker secretly captures the data, masquerades as the original sender, and sends it toward the receiver. The receiver replies to the attacker because the receiver does not authenticate the source. Therefore, the authentication between two parties is compromised due to an MITM attack. The existing authentication schemes adopt complicated mathematical procedures. Therefore, the existing schemes increase computation and communication costs. This paper proposes a lightweight and authentic end-to-end communication model to detect MITM attacks using a pre-shared symmetric key. In addition, we implement and analyze the performance of our proposed security model on Linux-based virtual machines connected to large-scale hybrid IPv4-IPv6 virtual networks. Moreover, security analyses prove the effectiveness of our proposed model. Finally, we compare the performance of our proposed security model with existing models in terms of computation cost and communication overhead. |
| format | Article |
| id | doaj-art-14584befaa07493fb6c095d7000e7d82 |
| institution | Kabale University |
| issn | 2410-387X |
| language | English |
| publishDate | 2024-10-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Cryptography |
| spelling | doaj-art-14584befaa07493fb6c095d7000e7d822024-12-27T14:19:33ZengMDPI AGCryptography2410-387X2024-10-01844910.3390/cryptography8040049Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM AttacksZeeshan Ashraf0Adnan Sohail1Muddesar Iqbal2Department of Computer Science & Software Engineering, Grand Asian University, Sialkot 51040, PakistanDepartment of Computing & Technology, IQRA University, Islamabad Campus, Islamabad 44310, PakistanSmart Systems Lab, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi ArabiaAfter the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. In an MITM attack, the attacker secretly captures the data, masquerades as the original sender, and sends it toward the receiver. The receiver replies to the attacker because the receiver does not authenticate the source. Therefore, the authentication between two parties is compromised due to an MITM attack. The existing authentication schemes adopt complicated mathematical procedures. Therefore, the existing schemes increase computation and communication costs. This paper proposes a lightweight and authentic end-to-end communication model to detect MITM attacks using a pre-shared symmetric key. In addition, we implement and analyze the performance of our proposed security model on Linux-based virtual machines connected to large-scale hybrid IPv4-IPv6 virtual networks. Moreover, security analyses prove the effectiveness of our proposed model. Finally, we compare the performance of our proposed security model with existing models in terms of computation cost and communication overhead.https://www.mdpi.com/2410-387X/8/4/49authenticationhybrid IPv4-IPv6 networkIoEkey exchangevirtualizationsecurity services |
| spellingShingle | Zeeshan Ashraf Adnan Sohail Muddesar Iqbal Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks Cryptography authentication hybrid IPv4-IPv6 network IoE key exchange virtualization security services |
| title | Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks |
| title_full | Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks |
| title_fullStr | Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks |
| title_full_unstemmed | Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks |
| title_short | Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks |
| title_sort | design and performance evaluation of an authentic end to end communication model on large scale hybrid ipv4 ipv6 virtual networks to detect mitm attacks |
| topic | authentication hybrid IPv4-IPv6 network IoE key exchange virtualization security services |
| url | https://www.mdpi.com/2410-387X/8/4/49 |
| work_keys_str_mv | AT zeeshanashraf designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks AT adnansohail designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks AT muddesariqbal designandperformanceevaluationofanauthenticendtoendcommunicationmodelonlargescalehybridipv4ipv6virtualnetworkstodetectmitmattacks |