Skip to main content
Top

2013 | OriginalPaper | Chapter

The Investigation and Realization of IPSec Strategy Based on Linux for IPv6

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IPSec is IP security protocol made by IETF which is designed for the next generation network, and is the mandatory part of IPv6 protocol stack. In this paper, the IPSec protocol and the Netfilter mechanism of Linux are introduced briefly. Then a new design idea and system design scheme is presented in detail, the final realization of IPSec protocol which is based on the Netfilter mechanism shows this scheme properly, efficiently and stability, which sets up the basis for the development of security route, VPN, next generation network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Security architecture for the internet protoco RFC2401 Security architecture for the internet protoco RFC2401
3.
4.
go back to reference The internet IP security domain of interpretation for ISAKMP RFC2407 The internet IP security domain of interpretation for ISAKMP RFC2407
5.
go back to reference Internet security association and key management protocol RFC2408 Internet security association and key management protocol RFC2408
6.
7.
8.
go back to reference The OAKLEY key determination protocol RFC2412 The OAKLEY key determination protocol RFC2412
9.
go back to reference PF_KEY key management API, Version 2 RFC2367 PF_KEY key management API, Version 2 RFC2367
10.
go back to reference The use of HMAC-MD5-96 within ESP and AH RFC2403 The use of HMAC-MD5-96 within ESP and AH RFC2403
11.
go back to reference The use of HMAC-SHA-1-96 within ESP and AH RFC2404 The use of HMAC-SHA-1-96 within ESP and AH RFC2404
12.
go back to reference The ESP DES-CBC Cipher algorithm with explicit IV RFC2405 The ESP DES-CBC Cipher algorithm with explicit IV RFC2405
13.
go back to reference The NULL Encryption algorithm and its use with IPSec RFC2410 The NULL Encryption algorithm and its use with IPSec RFC2410
14.
go back to reference Doraswamy N, Harkins D (2000) IPSec: a new generation of network safety standards, Beijing Doraswamy N, Harkins D (2000) IPSec: a new generation of network safety standards, Beijing
15.
go back to reference Gao X, Tang J (2004) The realization of the Linux IPSec protocol using Embedded mode, Computer application vol 24 Gao X, Tang J (2004) The realization of the Linux IPSec protocol using Embedded mode, Computer application vol 24
18.
go back to reference Satchell ST, Clifford HBJ (2000) Linux IP Protocol stack source code analysis, Beijing Satchell ST, Clifford HBJ (2000) Linux IP Protocol stack source code analysis, Beijing
19.
go back to reference Sklower K (1991) A tree-based packet routing table for Berkeley Unix[A]. In: USENIX Winter 1991 Technical Conference[C], pp 93–104 Sklower K (1991) A tree-based packet routing table for Berkeley Unix[A]. In: USENIX Winter 1991 Technical Conference[C], pp 93–104
21.
go back to reference Xu X (2002) The analysis and implementation of IPSec protocol, Zhejiang university Xu X (2002) The analysis and implementation of IPSec protocol, Zhejiang university
22.
go back to reference Xujing,Dianfu Ma (2001) The design and implementation of IPSec, J Beijing univ aeronaut astronaut, 27(4) Xujing,Dianfu Ma (2001) The design and implementation of IPSec, J Beijing univ aeronaut astronaut, 27(4)
Metadata
Title
The Investigation and Realization of IPSec Strategy Based on Linux for IPv6
Authors
Rui Su
Wei Su
Copyright Year
2013
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-37502-6_96

Premium Partner