A New Mechanism to Secure IPv6 Networks Using Symmetric Cryptography

被引:0
作者
El Ksimi, Ali [1 ]
Leghirs, Cherkaoui [1 ]
机构
[1] Univ Hassan 2 Casablanca, Fac Sci & Technol, RTM Team, L M, Mohammadia, Morocco
来源
MOBILE, SECURE, AND PROGRAMMABLE NETWORKING | 2019年 / 11557卷
关键词
IPv6; DAD; Security; NS; NA; Multicast; Cryptography; ADDRESS CONFIGURATION;
D O I
10.1007/978-3-030-22885-9_20
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Traditionally, configuring a network interface of a machine requires manual configuration and it's often a long and tedious job. With IPv6, this configuration is automated, introducing plug-and-play functionality to the network interface. Automatic configuration means that a machine gets all the information it needs to connect to an IPv6 LAN without any human intervention. The IPv6 address auto-configuration process includes creating a link-local address, verifying its uniqueness, and determining global unicast addresses. Checking the uniqueness of an IPv6 address is done by running an algorithm called DAD (Duplicate Address Detection) by the new node. This algorithm uses the multicast communications namely the messages neighbor solicitation and neighbor advertisement. However, this mechanism is not secure. In our paper, we propose a new algorithm to secure these multicast communications using symmetric cryptography. Our method shows its efficiency in terms of execution time and security level.
引用
收藏
页码:229 / 246
页数:18
相关论文
共 50 条
  • [31] Security Mechanism for IPv6 Stateless Address Autoconfiguration
    Praptodiyono, Supriyanto
    Hasbullah, Iznan H.
    Kadhum, Mohammed M.
    Murugesan, Raja Kumar
    Wey, Chong Yung
    Osman, Azlan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, COGNITIVE SCIENCE, OPTICS, MICRO ELECTRO-MECHANICAL SYSTEM, AND INFORMATION TECHNOLOGY (ICACOMIT), 2015, : 31 - 36
  • [32] Secure Session Key Sharing Using Symmetric Key Cryptography
    Arora, Shweta
    Hussain, Muzzammil
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 850 - 855
  • [33] A Bio-Inspired Secure IPv6 Communication Protocol for Internet of Things
    Saleem, Kashif
    Chaudhry, Junaid
    Orgun, Mehmet A.
    Al-Muhtadi, Jalal
    2017 ELEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2017, : 292 - 297
  • [34] Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
    Gueye, Assane
    Mell, Peter
    Harang, Richard
    La, Richard J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 261 - 276
  • [35] Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
    Ashraf, Zeeshan
    Sohail, Adnan
    Iqbal, Muddesar
    ELECTRONICS, 2024, 13 (13)
  • [36] A Novel Security Mechanism in Symmetric Cryptography Using MRGA
    Modi, Bhoomika
    Gupta, Vinitkumar
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 195 - 203
  • [37] Enabling Security on 6LoWPAN/IPv6 Wireless Sensor Networks
    Halcu, Ionela
    Stamatescu, Grigore
    Sgarciu, Valentin
    PROCEEDINGS OF THE 2015 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2015, : SSS29 - SSS32
  • [38] A Multipurpose Global Passport Solution using IPv6
    Murugesan, Raja Kumar
    Ramadass, Sureswaran
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 405 - 407
  • [39] A Secure Routing Mechanism Against Wormhole Attack in IPv6-based Wireless Sensor Networks
    Chen, Tao
    Huang, Haiping
    Chen, Zhengyu
    Wu, Yiming
    Jiang, Hao
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 110 - 115
  • [40] Secret communication by using data hiding in IPv6
    Carli, M.
    De Castro, A.
    Neri, A.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VI, 2007, 6538