Security Model for TCP/IP Protocol Suite M. Anand Kumar Department of Information Technology, Karpagam University, India anandm_ss@yahoo.co.in Dr. S. Karthikeyan Department of Information Technology, College of Applied Sciences Sultanate of Oman skaarthi@gmail.com Abstractthe Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build mechanism IPsec for security, it lacks security in Application layer of TCP/IP protocol suite. IPv6 solves most of the security breaches for IPv4 with the use of IPsec. But IPsec doesn’t have any security provision in the application layer. So there is a need for security mechanism. In this paper some of the security flaws of IPv6 are identified and we present a new architecture for TCP/IP protocol suite. Our proposed architecture includes a layer called security layer, which guarantees security to Application layer using a protocol Application layer security protocol (ALSP). Index TermsInternet, TCP/IP, Cryptography, Security, Protocol I. INTRODUCTION The perception of security is traditionally connected to exigencies of defending sensitive data from illegal access. But at the moment network security is often approached from a different perception. With the growing use of the Internet infrastructure for commercial applications, the demand for Quality of service is one of the emerging paradigms in Internet and seems to be the corner stone for more and more network services [1]. An increasing number of applications need multifaceted, consistent control protocols for guaranteeing Quality of service. As an outcome the need for security in network infrastructure is stronger than ever. Internet is based on TCP/IP protocol suite. IP was not planned with security in mind. The severe security flaws of the TCP/IP protocol suite exist since the host relies on IP source address for authentication. The existing network layer protocol in the TCP/IP protocol suite is at present IPv4 (Internet-working protocol version 4). Even though IPv4 is well designed, its security breaches make it inappropriate for the fast emerging Internet. To over come these drawbacks, IPv6 (Internet-networking protocol version 6) also known as IPng was planned which became a standard in the recent past. [1]. Internet Protocol version 6 or IPv6 is an enhanced version of the IPv4, which is a current version, and most widely used Internet Protocol. IP enables data to be sent from one workstation to another in a network and is known as a connectionless protocol since there is no continuous connection between the two communicating devices. Therefore when a message is sent by means of IP it is broken up into packets, which may travel through a number of different routes to their final destination, and on arrival at their destination they are reassembled in their original form. Each device in a network has an IP address, which is used by the IP protocol to ensure that the packets of information reach their correct destination. It holds great guarantee to become the backbone of the prospect of the Internet and offers an important improvement over IPv4 in terms of scalability, security, mobility and convergence [2]. The Internet Engineering Task Force (IETF) standardized the basic framework of the IPv6 protocol in the 1990s. But, there is still ongoing development of certain advanced aspects of the protocol [2]. The rest of the paper is presented as follows. In section II we describe the architecture of TCP/IP model followed by cryptographic algorithms in section III. We then describe the proposed architecture in section IV. In section V, we analyze the performance and finally conclude in section VI. II. TCP/IP ARCHITECTURE OVERVIEW The TCP/IP protocol suite, as well referred to as the Internet protocol suite, is the set of communications protocols that implements the protocol stack on which the Internet and most commercial networks run. It is named after the two most important protocols in the suite: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). Internet Protocol is the foundation of the TCP/IP protocol suite, since it is the mechanism responsible for delivering datagram’s The TCP/IP protocol suite—like the OSI reference model—is defined as a set of layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that are transmitted physically over the network [4] JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, VOL. 2, NO. 2, MAY 2011 87 © 2011 ACADEMY PUBLISHER doi:10.4304/jait.2.2.87-91