Analysis security system performance MIPv6 in signaling process using AES and Twofish algorithms

Supriyanto Praptodiyono, Fadil Muhammad, Dhandy Wiriyadinata


Mobile technology has become a necessity for modern society in the digital era. The ease of various information processes is a driving force for the growth of mobile users. To support continuous connectivity, Mobile IPv6 (MIPv6) is a solution and successor to the current Mobile IPv4 technology. Mobility in accessing a wide range of services is carried out via the Internet, but activities on the Internet make us vulnerable to various malicious acts. Issues such as information security as well as high overheads are a concern for mobile communications. An encryption mechanism is required throughout the signaling phase to construct security associations to enhance MIPv6 security performance. IPsec offers security services at the network layer. There are three encryption algorithms in IPsec, namely DES, 3DES, and AES. The DES algorithm is no longer recommended due to security factors, while AES is still not optimal in wireless networks. This study aims to analyze the performance of the MIPv6 security system and service quality with the AES and Twofish algorithms. Twofish algorithm is a candidate that has the potential for better performance. The experiment concluded that the performance of the Twofish algorithm is superior based on the security of cryptanalysis attacks with a cracking time that is twice as long as AES. In terms of service quality, Throughput Twofish has an increase of 20.05% with a small delay compared to AES, while packet loss is 0.023% for Twofish and 0.077% for AES.


Teknologi seluler menjadi kebutuhan masyarakat modern di era digital, kemudahan berbagai proses pengelolaan informasi menjadi pendorong pertumbuhan pengguna seluler. Untuk mendukung konektivitas berlanjut, Mobile IPv6 (MIPv6) menjadi solusi sekaligus penerus teknologi Mobile IPv4 saat ini. Mobilitas akses layanan yang luas dilakukan melalui Internet, namun aktivitas di jaringan Internet membuat kita rentan terhadap berbagai tindakan jahat. Masalah seperti keamanan informasi serta overhead yang tinggi menjadi perhatian komunikasi seluler. Untuk meningkatkan performa keamanan MIPv6, diperlukan metode enkripsi saat proses pensinyalan yang akan membangun asosiasi keamanan. IPsec menawarkan layanan keamanan di lapisan jaringan. Terdapat 3 algoritma enkripsi dalam IPsec, yaitu DES, 3DES, dan AES. Algoritma DES sudah tidak direkomendasikan karena faktor keamanan, sementara AES masih belum optimal dalam jaringan nirkabel. Penelitian ini bertujuan untuk menganalisis performa sistem keamanan dan kualitas layanan MIPv6 dengan algoritma AES dan Twofish. Algoritma Twofish merupakan kandidat yang memiliki potensi performa yang lebih baik. Eksperimen berhasil menyimpulkan bahwa performa algoritma Twofish unggul berdasarkan keamanan serangan kriptoanalisis dengan waktu cracking dua kali lebih lama dibandingkan AES. Dari segi kualitas layanan, Throughput Twofish memiliki kenaikan 20,05% dengan delay yang kecil dibanding AES sementara packet loss masing-masing 0,023% pada Twofish dan 0,077% pada AES.


Mobile IPv6, IPsec, AES, Twofish.

Full Text:



Asosiasi Penyedia Jasa Internet Indonesia. Laporan Survei Internet APJII 2019 – 2020. Accessed on September 3, 2021. Available at

Perkins, C. E., & Johnson, D. B. (1996). Mobility support in IPv6. Proceedings of the 2nd annual international conference on Mobile computing and networking, pp. 27-37.

Nurcahyani, W. T., Yulianto, F. A., & Herutomo, A. (2015). Analisis performansi Fhmipv6 (fast handover for hierarchical Mobile Ipv6) pada jaringan wave (wireless access in vehicular environment) 802.11 p. eProceedings of Engineering, vol. 2, no. 2, pp. 6550-6557.

Praptodiyono, S., Firmansyah, T., Alaydrus, M., Santoso, M. I., Osman, A., & Abdullah, R. (2020). Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey. Security and Communication Networks, vol. 2020, pp. 1-18.

Abikoye, O. C., Garba, Q. A., & Akande, N. O. (2017). Implementation of textual information encryption using 128, 192 and 256 bits advanced encryption standard algorithm. Annals. Computer Science Series, vol. 15, no. 2, pp. 153-159.

Frankel, S., & Krishnan, S. (2011). Ip security (ipsec) and internet key exchange (ike) document roadmap. Request for Comments, no. 6071.

Barker, E., & Roginsky, A. (2018). Transitioning the use of cryptographic algorithms and key lengths (No. NIST special publication (SP) 800-131A Rev. 2 (Draft)). Maryland: National Institute of Standards and Technology.

Oluwakemi, C. A., Haruna, A. D., Abubakar, A., Akande, N. O., & Asani, E. O. (2019). Modified advanced encryption standard algorithm for information security. Symmetry, vol. 11, no. 12, pp. 1-16.

Zodpe, H., & Sapkal, A. (2020). An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University-Engineering Sciences, vol. 32, no. 2, pp. 115-122.

Mahendra, L. I. B., Santoso, Y. K., & Shidik, G. F. (2017, October). Enhanced AES using MAC address for cloud services. 2017 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 66-71.

Ghosh, A. (2020). Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. International Research Journal of Engineering Technology, vol. 7, pp. 4656-4658.

Harahsheh, H., & Qatawneh, M. (2018). Performance evaluation of Twofish algorithm on IMAN1 supercomputer. International Journal of Computer Applications, vol. 179, no. 50, pp. 1-7.

Divya, V., & Gobinath, R. (2019). Two fish cryptography for data security in network communication. Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 4, pp. 986–989.

Praptodiyono, S., & Barita, D. (2020). Peningkatan kinerja sistem keamanan pada proses pensinyalan dalam vertical handover MIPv6". Setrum: Sistem Kendali-Tenaga-elektronika-telekomunikasi-komputer, vol. 9, no. 1, pp. 1-7.

Praptodiyono, S., Santoso, M. I., Firmansyah, T., Abdurrazaq, A., Hasbullah, I. H., & Osman, A. (2019). Enhancing IPsec performance in mobile IPv6 using elliptic curve cryptography. 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 186-191.



  • There are currently no refbacks.

Copyright (c) 2021 Teknika: Jurnal Sains dan Teknologi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Creative Commons License

Teknika: Jurnal Sains dan Teknologi is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.