Proposed DAD-match Security Technique based on Hash Function to Secure Duplicate Address Detection in IPv6 Link-local Network

被引:8
作者
Al-Ani, Ahmed K. [1 ]
Anbar, Mohammed [1 ]
Manickam, Selvakumar [1 ]
Al-Ani, Ayman [1 ]
Leau, Yu-Beng [2 ]
机构
[1] USM, Natl Adv IPv6 Ctr, Gelugor 11800, Penang, Malaysia
[2] UMS, Sabah 88400, Malaysia
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2017) | 2017年
关键词
Duplicate Address Detection; DAD; DoS attack; IPv6; Security; Hash Function; DAD-match Technique; ISSUES; ATTACK;
D O I
10.1145/3176653.3176707
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing number of nodes, connecting on the same link needs a distinct Internet protocol (IP) address for each node. Duplicate address detection (DAD) is the process responsible for verifying the uniqueness of the IP address on the same link by using two neighbor discovery protocol (NDP) messages, namely, neighbor solicitation and neighbor advertisement. Given that NDP messages are unsecured by their design, any node can manipulate these messages and launch a denial of service (DoS) attack. This attack on DAD prevents legitimate node from configuring its IP address. Many mechanisms have been proposed to address this issue, but they have exhibited side effects, such as complexity and performance degradation. This study proposed a new security technique called DAD-match that relies on cryptographic hash function to hide a tentative IP address during the DAD procedure. We aimed to develop a DAD-match technique that will provide a noncomplex lightweight security and completely prevent DoS attacks during DAD procedure in IPv6 link-local network.
引用
收藏
页码:175 / 179
页数:5
相关论文
共 33 条
  • [1] Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations
    AlSa'deh, Ahmad
    Meinel, Christoph
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (04) : 26 - 34
  • [2] AlSadeh A., 2013, THEORY PRACTICE CRYP, P178, DOI DOI 10.4018/978-1-4666-4030-6.CH008
  • [3] Open problems in hash function security
    Andreeva, Elena
    Mennink, Bart
    Preneel, Bart
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 611 - 631
  • [4] [Anonymous], 1992, MD5 MESSAGE DIGEST A
  • [5] [Anonymous], INTERNET PROTOCOL VE
  • [6] [Anonymous], 2011, INT J CONTROL AUTOMA
  • [7] [Anonymous], 2007, 4861 RFC
  • [8] [Anonymous], INTERNET PROTOCOL VE
  • [9] Arkko J., 2005, SECURE NEIGHBOR DISC
  • [10] Security of Internet location management
    Aura, T
    Roe, M
    Arkko, J
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 78 - 87