Loading

Secure Data Communication using Protocol Steganography in IPv6
Sandip Bobade1, Rajeshawari Goudar2
1Sandip Bobade, MIT Academy of Engineering Alandi (D),Pune, India.
2Rajeshawari Goudar, Savitribai Phule Pune University, India.
Manuscript received on November 19, 2014. | Revised Manuscript received on December 07, 2014. | Manuscript published on December 30, 2014. | PP: 104-109 | Volume-4 Issue-2, December 2014. | Retrieval Number:  B3617124214/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In secure data communication Network Security is important. Basically in cryptography Encryption is used for data security. Still attacker can attract towards encrypted data due to different form of data.so this limitation could overcome by using steganography. Steganography is the technique of information hiding. In steganography different carriers can be used for information hiding like image, audio, video, network protocols. Network steganography is a new approach for data hiding. In network steganography network layer protocol of TCP/IP suite are used for data hiding. In Network layer covert channels are used for data hiding. Covert channels violate security policies of the system. Covert channels are either used for steal the information or communicate secrete information overt a network. Covert channel in TCP, IPv4 are previously implemented and studied. IPv6 is a new generation protocol which slowly replaces IPv4 in future because IPv4 is rapidly running out. So there is need to examine security issues related IPv6 protocol. Covert channels are present in IPv6 protocol. 20 bit Flow label field of IPv6 protocol can be used as covert channel. RSA algorithm is used for data Encryption. Chaotic method used for data encoding. Secret data communication is possible in IPv6.
Keywords: Covert channel, Steganography, TCP IP, Network Security, Chaos Theory.