You are on page 1of 5

A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G

Networks using OOAD Class and Instance Diagrams.


1
Hanumanthappa.J.,2Dr.Manjaiah.D.H, 3Joshi Vinayak.B.
1
Teacher Fellow,Dos in Computer Science,University of Mysore,Manasagangothri,Mysore,INDIA.
2
Reader and Chairman,Dept of Computer Science,Mangalore University,Mangalagangothri,Mangalore,INDIA.
3
Research Scholar,Dept of Computer Science,MangaloreUniversity,Mangalagangothri,Mangalore,INDIA.
hanums_j@yahoo.com,ylm321@yahoo.co.in,vbjj@rediffmail.com.

Abstract:In this paper we consider the use of recently sanctioned An IPv6-in-IPv4 Tunnel T=<A,B>is a point to point link
project “Design Tool of IPv6 Mobility for 4G- between two dual stack interfaces A(the tunnel source) and
Networks(DTMIPv6)”.It describes one of our major research
project work sponsored by UGC,New Delhi to study how the B(the tunnel destination)or routers.We denote respectively
IPv6 in IPv4 Static tunneling works in 4G networks,how to avoid with A4 and B4 and with A6 and B6 the IPv4 and IPv6 addresses
the various threat issues by an IPv6 in IPv4 Static tunneling.One of A and B and we represent bidirectional tunnels as two
of the terms used to describe 4G networks is MAGIC-Mobile
tunnels with the same end points in inverted order and thus if a
Multimedia,AnytimeAnywhere,Global mobility
support,Integrated wireless solution,and Customized personal tunnel T=<A,B>is bidirectional then T1=<B,A>also exists.A
service.The main important approach of 4G mobile Tunnel operates as follows:When an IPv6 is sent through a
communication system is projected to solve still-all the tunnel exists from a node A to B then a source node creates an
remaining problems of 3G and to provide a wide variety of
new services,from high-quality voice to high-definition video and IPv4 packet with source addresses A4 and the destination
to high-data rate wireless channels. addresses B4 whose pay load packet is IPv6 packet where as in
GRE or Teredo tunnels no extra headers are added and the
Keywords:Automatic tunnels,IPv6 in IPv4 Static tunnels,4G
packet is marked as an encapsulating IPv6 packet by setting
Networks etc.
I.Introduction: the IPv4 protocol field to 41.The IPv6 packet is then sent to B
a. Introduction to Tunnels in 4G networks. over the IPv4 network.When the destination workstation
Tunnel is a bidirectional point–to-point link between two receives the packet it checks the IPv4 source address to predict
network endpoints.The term “tunneling” refers to a means to whether it belongs to a known tunnel and if so it decapsulates
encapsulate one version of IP in another so the packets can be the packet and processes it smoothly as it had arrived on any
sent over a backbone that does not support the encapsulated IP other IPv6 workstation.Suppose if the IPv6 packet is
version.The various examples of the former include IPX-in-IP
forwarded then the hop-limit field header is decremented by
encapsulation[15],IPv6-in-IPv4 encapsulation[12],and other
examples of the latter include IPSec[13] and Virtual private 1.IPv6 in IPv4 tunnels are also called as single workstation
networks[14].Tunnels are an important part of the IPv4 to tunnels i.e they appear to the IPv6 as a single point to point
IPv6 transition strategy,and the IPv6 specifications define path which hides the complexity of IPv4 network[12].
many different types of tunnels.Their discovery is essential for
studying the topology and the evolution of the IPv6 network
and is useful for troubleshooting and performance Fig.1.The IPv6 in IPv4 Tunnel.
optimization.Tunnelling consists the encapsulation of the The research on IPv6 tunneling can be classified as
packets of a network-layer protocol within the packets of a follows:
second protocol,such that the former regards the latter as its (1)Research on basic IPv6 Tunneling mechanisms:A
data link layer[19].Because of the flexibility it provides(any number of different tunneling mechanisms(e.g.Automatic
protocol can be transported,including the encapsulating tunneling,Manually Configured tunneling,6–to-4 Tunnel
protocol itself),tunneling is widely used both to expand broker,Automatic 6 to 4 tunnel,Automatic 4 to 6
networks without having to deploy native infrastructure and to Tunnel,IPv6 over IPv4 GRE Tunnel etc)have been
improve security.Similarly to other network discovery proposed for varied tunneling requirements.These
problems,its importance derives from the need for up-to-date tunneling mechanisms provide tools for the whole
information about network topology and from the impact that transition process.Data is carried through the tunnel using
topology is known to have on crucial aspects of network a process called encapsulation in which IPv6 packet is
behavior such as the dynamics of routing protocols,the carried inside an IPv4 packet which makes IPv4 as a Data
scalability of multicast,the efficacy of denial-of-service counter Link layer with respect to IPv6 packet transport.The term
measures[15][16]and other aspects of protocol tunneling refers to a means to encapsulate one version of
performance[17]. IP in another so the packets can be sent over a backbone
b. General Working procedure for the operation of Tunnels that does not support the encapsulated IP version.It is
process by which information from one protocol is
encapsulated inside the packet of protocol brokers,6-to-4[12],ISATAP[13]and Teredo[14].IPv6 also
architecture,thus enabling the original data to be carried supports for GRE tunnels over IPv4,our results suggest that
over the second protocol.This mechanism can be used tunnels are very common in the today’s internet and the
when two nodes that use same protocol wants to transition to IPv6 occurs smoothly and slowly.So tunnels to
communicate over a network that uses another network continue to play an important role in IPv6 networks,as IPv4
protocol.The tunneling process involves three network infrastructure will remain widely deployed for many
steps:encapsulation,decapsulation,and tunnel years.
management.It also requires two tunnel end-points,which a.Types of Tunneling in 4G Networks.
in general case are dual-stack IPv4/IPv6 nodes,to handle Tunneling techniques are broadly divided into two types,first
the encapsulation and decapsulation.Tunneling is one of one is an automatic tunneling and second one is configuration
the key deployment strategies for both service providers
tunneling.The tunneling technique we can use the compatible
and enterprises during the period of IPv4 and IPv6
coexistence. addresses discussed as shown in the below figure-6.A
Tunneling allows service providers to offer an end-to-end compatible address is an address of 96 bits of zero followed by
IPv6 service without major upgrades to the infrastructure 32 bits of IPv4 address.It is used when a computer using IPv6
and without impacting current IPv4 services.Tunneling wants to send a message to another computer using
allows enterprises to interconnect isolated IPv6 domains IPv6.However suppose the packet passes through a region
over their existing IPv4 infrastructures,or to connect to where the networks are still using IPv4.The sender must use
remote IPv6 networks such as the 6bone.The IETF has the IPv4-compatible address to facilitate the passage of the
made a great contribution on this topic. packet through the IPv4 region.For example the IPv4 address
(2)Research on analyzing the typical tunneling 2.13.17.14 becomes 0::020D:110E.The IPv4 is pre pended
scenarios and how to provide relevant tunneling with 96 zeros to create a 128–bit address(See figure-3)[10].
schemes:As there are a variety of different scenarios
during IPv6 tunneling the typical scenarios need to be
emphasized about IPv6 deployment and applying suitable
Fig3.The IPv6 Compatible Address.
transition mechanisms.
b.Representation of IPv6 Tunneling types in 4G Networks
This paper presents a comprehensive explanation about the with Class-Diagrams and Instance Diagrams.
current status of research on IPv6 in IPv4 Static Tunneling
mechanisms with Automatic 6 to 4 Tunneling.This paper is
organized as follows:We briefly described Introduction to
tunnels in 4G networks,Preliminary Definitions of
Tunneling Techniques,General Working procedure for the Fig 4.The Tunneling types with Class-Diagram.
operation of Tunnels,Research on IPv6 tunneling issues in As we know that tunneling types are broadly divided into
Section 2.We described,4G and IPv6 networks,desirable Automatic,Manually configured tunneling,GRE
characteristics of 4G networks,the characteristics of IPv6 tunneling,Tunnel brokers etc.In Fig.4.we have represented the
4G,Initiatives on the 4G in section 3.Basic IPv6 Tunneling tunneling types by using Class-Diagrams.A Class digram is a
Mechanisms,Role of IPv6 tunnels in 4G,Types of tunneling type of Object diagram.A Class diagram is a
in 4G networks,representation of IPv6 Tunneling types in Schema,pattern,or template for describing many possible
4G Networks with Class-Diagrams and Instance Diagrams instances of data.A Class diagram describes Classes[16].A
and a Static tunneling in 4G networks,limitations of IPv6 Class diagram represents either bidirectional or ternary
static tunneling.in section 4.The prototype,threat analysis relationship.In Fig.4.a Class Diagram may be traversed either
due to transition mechanism,IPv6 tunneling,IPv6 from Left to Right or from Right to Left.In the Fig.4.5+
threats,Security issues in IPv6 tunneling has explained in represents the value of multiplicity(Multiplicity specifies how
section 5,The future innovative challenges of IPv6 threats many instances of one class may relate to a single instance of
has covered in section 6.Finally we concluded the whole an associated class.Or Multiplicity constrains the number of
paper in section 7. related objects.) i.e.IPv6 Tunneling has broadly divided into
I. IPv6 Tunneling Methods in 4G networks. more than 5 types.A Solid ball is the OMT symbol for “many”
This section presents a number of tunneling techniques we meaning zero or more.A hollow ball indicates “optional”
have studied and analyzed to tackle the tunneling meaning zero or more[16].has-divided represents the Binary
mechanisms/strategies.Depending on their objective tunneling association between IPv6-Tunneling and Tunneling
types are broadly divided into different types depending upon type.Instance Diagram is also another type of Object diagram
the IPv6 specifications.The IPv6 specification defines several which represents objects or instances.The Fig.5.specifies an
types of IPv6-in-IPv4 tunnels,including Manually configured Instance diagram for Tunneling types[16][17][18].The lines
tunneling,Automatic tunneling,Generic routing encapsulation between the objects or instances represents the links[16][17].
(GRE), Semiautomatic tunneling mechanisms such as tunnel
Threat modeling (or analysis) is essential in order to help us to
develop a security model than can focus or protecting against
certain threats and manage the related assumptions. One
Fig.5.The Tunneling types with Instance-Diagram. methodology to discover and list all possible security attacks
against a system is known as attack trees.To create an attack
d. Static Tunneling in 4G Networks. tree we represent attacks against a system in a tree structure,
Static tunneling is also called as Configured tunneling.Static the attack goals as root nodes and the different sub goals
tunneling can be used to link isolated islands of IPv6, in which necessary to achieve them as their leaf nodes.Figure-7
the network domains are well known and unlikely to change represents the general threat categories we have identified
against network convergence architectures namely attack on
without notice.A static configured tunneling is equal to a
the network processes are responsible for IPv6 transition,Dual
permanent link of two IPv6 domains with the permanent stack,Automatic tunneling and Configuration tunneling
connectivity provided over an IPv4 backbone.Static tunneling threats.Dual Stack threats are totally different from the IPv6
assigned IPv4 addresses are manually configured to the tunnel Tunneling techniques like an automatic tunneling and
source and the tunnel destination.The identification of which Configuration tunneling,manually configured tunneling,Static
packets has to send through a tunnel via a routing table in the tunneling etc.As we have discussed there are large number of
tunnel end points,the table direct packets based on their transition mechanisms to deploy IPv6 but broadly be
categorized into,Dual Stack,Tunneling(Automatic,Manual
destination address using prefix mask and match technique.In
Configuration),and Translation Header.The problems are
a static tunneling the host or router at each end of a static identified when IPv6 is tunneled over IPv4 encapsulated in
configured tunnel must support both IPv4 and IPv6 protocol UDP as UDP is usually allowed to pass through NATS and
stacks.The static tunneling in 4G networks was most Firewalls [59].Consequently allowing an attacker to punch
preferred when the necessary of a few tunnels to forward a holes with in the security infrastructure.The First and Second
packets from source host to the destination host via tunnel end authors of this paper recommends that if the necessary security
points.The below figure-6.shows the IPv6 static tunneling in measures cannot be taken ,tunneled traffic should be used with
caution if not completely blocked.To provide ingress and
4G networks.The requirements of IPv6 Static tunneling are
egress filtering of known IPv6 tunneled traffic, perimeter
R1,R2 are dual stack.R1 has a reachable address from R2 and firewalls should block all inbound and outbound IPv4 protocol
vice versa.In IPv6 static tunneling static configuration is 41 traffic.For circumstances where Protocol 41 is not blocked
possible on both the ends.The IPv6 static tunneling has it can easily be detected and monitored by the open-source
dependency on the 4 pararmeters like IPv6,IPv4,R1,R2. IPv4 IDS Snort.During the development of the IP6-to-IPv4
threat model we have identified that several attacks lead to
other attacks which we have previously included and
analyzed.These are represented in the tree as identical nodes in
Fig.6.IPv6 Static tunneling in 4G networks. different locations.
The below Table-1 shows the configuration of IPv6 Static tunneling in 4G b. IPv6-Tunneling-IPv6 Threats.
networks. In Tunneling based methods,when a tunnel end point receives
Configuration Parameter Router R2 Router R1 an encapsulated data packet,it decapsulates the packet and
IPv6 Source address 3ffe:b00:1:1:: 3ffe:b00:1:1::2 sends it to the other local forwarding scheme.The security
1 threats in tunneling mechanisms,take IPv6 over IPv4 tunnel
IPV6 Destination 3ffe:b00:1:1:: 3ffe:b00:1:1:1 are mostly caused by the spoofed encapsulated packet sent by
address 2 the attackers in an IPv4 networks.(Refer-Fig.7).As shown in
IPv4 Source address 192.0.2.1 192.0.3.1 Fig.7.the target of attacks can be either a normal IPv6 node, or
IPv4 Destination address 192.0.3.1 192.0.2.1 the tunnel end point.

4.4.1.Limitations of IPv6 static tunneling.


 Manual configuration is not manageable,if Fig.9.Spoofing in an IPv4 with 6 to 4.
the number of tunnels are increasing.
 If the IP addresses change,then changes in
manual configuration is also possible.
 IP protocol 41 might be filtered in the path. Fig.7.Security issues of various tunneling types.
 Does not traverse NAT.
IV.Related Work. c.The Security issues in IPv6 tunneling are as follows.
a.Threat Analysis due to Transition Mechanisms. 1. The hard to trace back :
Case-1:IPv4 networking node can make an attack on IPv6 or relay routers are sent to the target routers by the attackers in
node(network):The attackers(hackers) in IPv4 networks can the IPv6 network.In this case also 6 to 4 or relay routers are
make an attack on the IPv6 nodes through the 6to4 attacked by the broadcast addresses.
router(tunnel)end point by forwarding a spoofed encapsulated The security issues in tunneling mechanisms can generally
messages(Packets).Therefore here in this situation it is very limited by investigating the validness of the source/destination
difficult to trace back. address at each tunnel end point.Usually in tunneling
Case-2:IPv6 networking node can make an attack on IPv6 techniques it is easier to avoid ingress filtering
network (node):In this type the hacker in IPv6 networks can checks.Sometime it is possible to send packets having link-
make an attack on the IPv6 network through 6-to4 relay end local addresses and hop-limit=255,which can be used to attack
point and 6-to4 router by sending a spoofed encapsulated subnet hosts from the remote node,but it is very difficult to
packets.In this case also its very difficult to trace back.(Refer deal with attacks with legal IP addresses now[26].Since the
Fig-7) tunnel end points of configuration tunnels are fixed,so IPSec
2. Potential reflect- DoS attack on Destination Host can be used to avoid spoofed attacks[29].IPv6 Security issues
(Refer-Fig-7):The hackers in the IPv4 networks can make a even though it has provided lot off features but its known that
reflect–DoS attack to a normal IPv6 network (node) through automatic tunneling are dangerous as other end points are
the 6-to-4 router (tunnel) end point by sending the unspecified because it’s very difficult to prevent automatic
encapsulated packets with the spoofed IPv6 source address as tunneling mechanisms DoS/reflect-DoS attacks by the
the specific IPv6 node. attackers in IPv4 network.
3. Cheat by a Hacker with the IPv6 Neighbor Discovery V.Simulation and Results.
(ND) message:Whenever IPv4 network is treated as the link
layer in tunneling technology,the hackers in the IPv4 networks The following are the assumptions made in the ns-2 simulation
can cheat and DoS attack the tunnel end point by sending model.It consists of IPv6 automatic tunneling ,IPv6 manually
encapsulated IPv6 neighbor discovery (ND)messages with a configured tunneling,GRE tunneling,Tunnel broker etc.The
spoofed IPv6 link local address.The automatic tunneling Graph shown In figure-10 is the combined graph of number of
techniques like 6-to 4 and Teredo get the information of threats v/s tunneling types.we can observe that if we are using
remote tunnel end point from the certain IPv6 packets. static tunneling then number of threats were very
Distributed Reflection DoS:This type of attack can be small,otherwise if we are preferring Automatic tunneling or
performed if the very large number of nodes whenever manually configured tunneling then threats also increases.So
this paper shows how static tunneling is a best technique to
involved in the sending spoofed traffic with same source IPv6
avoid threat issues.The Static tunneling reduces the number of
addresses. threats as compared to other IPv6 tunneling types etc.Hence
1. If the Destination host generates replies by using TCP more number of threats to be avoided by using a static IPv6 to
SYN ACK,TCP RST,ICMPv6 Echo reply,ICMPv6 IPv4 tunneling.The below figure-10 shows the graph of IPv6
Destination unreachable etc):In this case of attack the threat v/s static tunneling in IPv6.
victim host is used as a reflector for attacking another
victim connected to the network by using a spoofed
source(Refer Fig-7).
2. Spoofing in IPv4 with 6 to 4:In this type of attack 6 to 4
tunneling spoofed traffic can be injected from IPv4 into
Fig.10.Threat V/s Tunneling types.
IPv6.The IPv4 spoofed address acts like an IPv4 source,6 to 4
relay any cast (192.88.99.1)acts like an IPv4 destination.The VI.The Current and future Innovative research
2002::spoofed source address acts like an IPv4 destination. challenges of IPv6 threat issues for Researchers.
[Refer-Fig-9] This paper has not considered the overall threat review of IPv6
for all the aspects like,IPv6 Static tunneling
7.Theft of Service:During the IPv6 transition period, many mechanisms,which is a large and complex topic.To provide a
sites will use IPv6 tunnels over IPv4 infrastructure. Sometimes complete overview of IPv6 security this paper should be in
we will use static or automatic tunnels.The 6 to 4 relay conjunction with the IPv6 to IPv4 threat review with IPv6
administrators will often want to use some policy limit the use Static and Automatic tunneling considerations.The most
of the relay to specific 6 to 4 sites or specific IPv6 important area to move forward with in IPv6 security is the
sites.However some users may be able to use the service extension of current IPv6 Firewalls and Network tools to test
regardless of these controls by configuring the address of the them(IPv6 packet constructors,IDS’s and so on).This will
relay using its IPv4 address instead of 192.88.99.1 or using the allow more users to adopt IPv6 without being paranoid about
router header to route the IPv6 packets to reach specific 6 to 4 their openness to attack.
relays. Before formulating analysis,we have proposed(formulated)
several innovative research challenges.Presently there have
8.Attack with IPv4 broadcast address:In the 6 to 4
been plenty of studies done on the research about basic
mechanisms,some packets with the destination addresses
security issues of IPv6, threat issues of IPv6,however there are
spoofed and mapped to their broadcast addresses of the 6to4
still so many problems not yet resolved yet,calling for great
challenges ahead.The innovative research challenges of IPv6 References
threat issues are as follows. [1].Dr.Manjaiah.D.H.,Hanumanthappa.J,2009,:IPv6 and IPv4 Threat reviews
1.Notion of the system identification within an with Automatic Tunneling and Configuration Tunneling Considerations
Transitional Model:A Case Study for University of Mysore
organization:With the advent of privacy extensions and the Network,International Journal of Computer Science and Information Security
size of IPv6 ranges in use,identifying systems within an (IJCSIS),Vol-3,Number-01,July-2009.
organization and in particular identifying mis behaving. [2].Dr.Manjaiah.D.H.,Hanumanthappa.J,2008,:A Study on Comparison and
2.Transition mechanisms from IPv4 to IPv6:The current Contrast between IPv4 and IPv6 Feature sets.,Proceedings of
ICCNS’08,2008,Pune.,pp.297-302.
research on the basic transition mechanisms mostly focus on [3].Dr.Manjaiah.D.H.,Hanumanthappa.J.2008,:Transition of IPv4 Network
the situation of IPv6 over IPv4.Due to advanced deployment Applications to IPv6 Applications,Proceedings of ICETiC-09,
of IPv6,the IPv4 networks may also be separated by IPv6 2009,S.P.G.C.Nagar,VirudhaNagar-626001,TamilNadu,INDIA.,pp.35-40.
ones.We are using only few kinds of method in this situation [4].Dr.Manjaiah.D.H.,Hanumanthappa.J.2009,:IPv6 over Bluetooth:Security
Aspects,Issues and its Challenges,Proceedings of NCWNT-09,2009,Nitte-574
like IPv4 configuration tunnel and DSTM,more research on 110,Karnataka,INDIA.,pp.18-22.
IPv4 over IPv6 transition methods is necessary. [5].Dr.Manjaiah.D.H.,Hanumanthappa.J.2009,:Economical and Technical costs
3.Increased dependence on multicast addresses in IPv6 could for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to
have some interesting implications with flooding attacks.For ETCTIPv6],Proceedings of NCWNT-09,2009,Nitte-
574110,Karnataka,INDA.,pp.12-17.
example all routers and NTP servers have site specific [6].Dr.Manjaiah.D.H.Hanumanthappa.J.2009,:An Overview of Study on
multicast addresses.Can we use site specific multicast Smooth Porting process scenario during IPv6 Transition(TIPv6),Proceedings of
addresses to create an amplification attacks as similar as to the IEEE IACC-09,2009,Patiala,Punjab,INDIA-6-7,March-2009.,pp.2217-2222.
smurf attacks in IPv4 4.We know that neighbor discovery is a [7].Dr.Manjaiah.D.H.Hanumanthappa.J.2009,:IPv6 over IPv4 QoS metrics in
4G–Networks:Delay,Jitter,Packet Loss Performance,Throughput and Tunnel
new addition to the IPv6 to replace ARP and RARP of IPv4 Discovery mechanisms.Proceedings of NCOWN-2009,RLJIT,Doddaballapur,
and also it is an essential component of a well-run IPv6 Bangalore,Karnataka,INDIA,August-21-22-pp.122-137.
network it should be tested from a security point like a [8].S.Deering and R.Hinden,:“Internet Protocol Version 6(IPv6)
Specification”,RFC 2460,December 1998.
neighbor-discovery cache fall victim to a resource starvation
[9].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall
attack in any of the currently deployed neighbor discovery Inc.,1996,pp.686,413-436,437-449.
implementations.Can the CPU of a device be exhausted by [10].Behrouz A.Forouzan,Third Edition,:“TCP/IP Protocol Suite”.
processing information of IPv6 neighbor discovery? [11].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-
5.IPv6 is new and security information on the protocol is not Hill,2003,pp-8-10.
widespread,it is the opinion of all the authors that a large [12].R.Gilligan and E.Nordmark ,”Transition mechanisms for IPv6 Hosts and
number of dual stack hosts may be more exposed to attack Routers”,RFC 2893,Aug 2000.
with IPv6 than in IPv4.6.With a new IPv6 header [13].R.Woodburn and D.Miills,”RFC1241:Scheme for an Internet
configuration, new extension headers, and ICMP message encapsulation protocol:Version 1”,July 1991.
types there may be a several novel ways to deal with flooding [14].R.Atkinson and S.Kent,”Security architecture for the internet
protocol”,RFC 2401,Nov.1998.
attacks.
[15].D.Provan,”RFC1234:Tunneling IPX traffic through IP networks”,June
7.Scenario Analysis:Typical Scenario analysis is still in 1991.
progress. Some of them are in draft mode, such as enterprise [16].Ali bahrami,”Object Oriented systems development using UML”,Mc-
network analysis along with this other possible scenarios Graw-Hill Intl editions,1999.
[17].James Rumbaugh,Michael Blaha,William Premeralini,”Object-Oriented
should also be analyzed to support for next coming future
Modeling and Design”,PHI,2001.
wireless technologies.
[18].Grady Booch,:Object oriented Design.
Conclusion.
M r.Hanumanthappa.J. is Lecturer at the DoS in
In this paper,we presented DTMIPv6 a Design tool for mobile CS,University of Mysore,Manasagangothri,Mysore-06
IPv6 to support IPv6 tunneling,IPv6 to IPv4 Static tunneling , and currently pursuing Ph.D in Computer Science and
Mobile IPv6 etc.Motion behind DTMIPv6 stems from the fact Engineering, from Mangalore University under the supervision of
Dr.Manjaiah.D.H on entitled “Design and Implementation of IPv4–to- IPv6 Transition
that how mobility,tunneling, threats issues,as well as security
Scenarios for 4G-Networks”.
plays an important role in 4G networks.We demonstrated how
DTMIPv6 can address several issues for the future networking
,research(innovation)and how it cope with complexity and
dynamic intrinsic to future environments.As for as we know Dr. Manjaiah.D.H is currently Reader and Chairman, Department
DTMIPv6 is also a system tool that offers mobility support of Computer Science Mangalore University, Mangalore. He received
PhD degree from University of Mangalore, M.Tech. From NITK, Surathkal and B.E.,
like other tools named such as proton for 4G mobile users.We from Mysore University. Dr.Manjaiah D.H has an extensive academic, Industry and
have also demonstrated concepts from IPv6 in IPv4 static Research experience. He has worked at many technical bodies like IAENG, WASET,
tunneling,threats issues,and its security issues to avoid threats ISOC, CSI, ISTE, and ACS. He has authored more than - 45 research papers in
can be applied to the design of novel solutions that brings us international conferences and reputed journals. He is the recipient of the several talks for
his area of interest in many public occasions and International and National conferences.
one more threat model and security model in open networking He is an expert committee member of an AICTE and various technical bodies. Dr
challenges.This project consolidates the idea of building a .Manjaiah. D.H’s areas interest are Computer Networking & Sensor Networks, Mobile
threat issues for IPv6 in IPv4 static tunneling. Communication, Operations Research, E-commerce, Internet Technology and Web
Programming.

You might also like