Compression of IPsec AH and ESP Headers for Constrained Environments
نویسندگان
چکیده
This document describes the header compression mechanisms for the IPsec [RFC4301] based on the encoding scheme standardized in [RFC6282]. The IPsec Authentication Header (AH) and Encapsulated Security Payload (ESP) headers are compressed using Next Header Compression (NHC) defined in [RFC6282]. This document does not invalidate any encoding schemes proposed in 6LoWPAN [RFC6282] but rather complements it with compressed IPsec using the free bits in the IPv6 Extension Header encoding.
منابع مشابه
Compression of Ipsec Ah and Esp Headers for 6lowpan Networks Draft-raza-6lo-ipsec-04
This document describes the header compression mechanisms for IPsec [RFC4301] based on the encoding scheme standardized in [RFC6282]. The IPsec Authentication Header (AH) and Encapsulated Security Payload (ESP) headers are compressed using Next Header Compression (NHC) defined in [RFC6282]. This document does not invalidate any encoding schemes proposed in 6LoWPAN [RFC6282] but rather complemen...
متن کاملDesign and Implementation of the Ipsec-based Security System
Ipsec is a standard protocol to offer Internet information security service. Recently Ipsec is implemented through out the world on the base of various operating systems. Through the inter-operability test among multiple independent implemented devices, it is now the mandatory function of Internet equipment. Ipsec adds two headers (i.e.,AH & ESP) and protocol to the legacy IP packet so therefor...
متن کاملAuthentication and Privacy in IPv4 and IPv6
This paper describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. An overview of key management requirements for systems implementing those security mechanisms will also be discussed. There are two specific headers that are used to provide security services in IPv4 and IPv6. These headers are the IP Authentication Header (AH) and th...
متن کاملInternet Engineering Task Force ( IETF ) D
ESP and AH protocols make use of various cryptographic algorithms to provide confidentiality and/or data origin authentication to protected data communications in the IP Security (IPsec) architecture. To ensure interoperability between disparate implementations, the IPsec standard specifies a set of mandatory-toimplement algorithms. This document specifies the current set of mandatory-to-implem...
متن کاملC-ISCAP(Controlled Internet Secure Connectivity Assurance Platform) : Design, Implementation and Evaluation
IPsec has now become a standard information security technology throughout the Internet society. It provides a well-defined architecture which takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism against replay attack also. For the connectionless security services on packet basis, IETF IPsec Working Group has standardized two extension head...
متن کامل