NDPsec: Neighbor Discovery Protocol Security Mechanism

被引:7
作者
Al-Ani, Ayman [1 ]
Al-Ani, Ahmed K. [2 ]
Laghari, Shams A. [3 ]
Manickam, Selvakumar [3 ]
Lai, Khin Wee [4 ]
Hasikin, Khairunnisa [4 ]
机构
[1] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Sabah, Malaysia
[2] Xiamen Univ Malaysia, Sch Comp & Data Sci, Sepang 43900, Selangor, Malaysia
[3] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, Gelugor 11800, Penang, Malaysia
[4] Univ Malaya, Fac Engn, Dept Biomed Engn, Kuala Lumpur 50603, Malaysia
关键词
Protocols; IP networks; Security; Internet; Local area networks; Routing protocols; Denial-of-service attack; Authentication; IPv6; NDP; denial of service; RA flooding; security; authentication; MITM; DEFENSE-MECHANISMS; ICMPV6-BASED DOS; DDOS ATTACKS; IPV6;
D O I
10.1109/ACCESS.2022.3196028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet connectivity and information technology (IT) expansion. Due to its enormous address pool, extendable headers, high level of security, and mobility, IPv6 is positioned as the next-generation Internet Protocol. NDP is an integral component of IPv6 since it resolves addresses, locates routers, and finds duplicated addresses in a local-link network. Because NDP is based on the premise that all nodes in the network are trustworthy, it is subject to a variety of attacks, including Denial of Service (DoS) on Duplicate Address Detection (DAD) attacks (aka. DoS-on-DAD), Address Resolution-based attacks, Router Advertisement (RA) based attacks, and Redirect attacks. This paper proposes an NDP security (NDPsec) mechanism based on the Ed25519 digital signature to authenticate IPv6 hosts to prevent unauthorized devices from joining the network. The proposed NDPsec mechanism is evaluated and compared to Secure NDP (SeND), Match-Prevention, and Trust-ND mechanisms. The performance is measured in terms of processing time, traffic overhead, and resilience against network-based attacks. The results obtained from the experiments showed that NDPsec successfully prevented cyberattacks, with approximately 144% less processing time and over 50% less traffic overhead compared to SeND (the default security mechanism for NDP protocol). The proposed NDPsec mechanism has remarkable superiority in terms of resilience against attacks compared to Match-Prevention and Trust-ND mechanisms.
引用
收藏
页码:83650 / 83663
页数:14
相关论文
共 36 条
  • [21] Huang Y., 2021, SECUR COMMUN NETW, V2021, P1
  • [22] Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites
    Li, Kwun-Hung
    Wong, Kin-Yeung
    [J]. INFORMATION, 2021, 12 (06)
  • [23] Mahmood Emir, 2019, International Journal of Services Operations and Informatics, V10, P65
  • [24] Najjar F., 2015, 4 INT C INTERNET APP, P967
  • [25] Narten T., 2001, Privacy extensions for stateless address autoconfiguration in ipv6
  • [26] Narten T., 2007, 4861 RFC
  • [27] Practical fault attack against the Ed25519 and EdDSA signature schemes
    Romailler, Yolan
    Pelissier, Sylvain
    [J]. 2017 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2017, : 17 - 24
  • [28] Towards a Secure IPv6 Autoconfiguration
    Shah, Junaid Latief
    Bhat, Heena Farooq
    [J]. INFORMATION SECURITY JOURNAL, 2020, 29 (01): : 14 - 29
  • [29] A novel approach for securing IPv6 link local communication
    Shah, Junaid Latief
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 136 - 150
  • [30] Novel Duplicate Address Detection with Hash Function
    Song, GuangJia
    Ji, ZhenZhou
    [J]. PLOS ONE, 2016, 11 (03):