Mohit Wadhwa

Learn More
Networking infrastructure, such as routers and firewalls, consist of a policy (i.e., where to forward which packets) and a mechanism that implements it. As the correctness of the policy is critical, it is a natural candidate for formal verification. Indeed, several verification algorithms have been developed, that detect anomalies, conflicts, and(More)
The next generation protocol (Ipv6) also called Iping, which should replace the current generation of Internet protocol (Ipv4), brings many enhancements over Ipv4. Ipv4 has been a great success for more than 20 years, since its interception in 1980 but due to limited address space, complex configuration and very important lack of security it does not fulfil(More)
The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security(More)
Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. this carrier can be Image,video, text or IP packet. Covert Channel is implemented in different header Fields of IPv4 header to send secrete message. A covert channel is the medium that is used to transmit the(More)
  • 1