Using multi-address generation and duplicate address detection to prevent DoS in IPv6

被引:8
|
作者
Song Guangjia [1 ]
Wang Hui [2 ]
Wang Hangjun [1 ]
机构
[1] Zhejiang A&F Univ, Sch Engn & Technol, Jiyang Coll, Zhuji, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team Co, Beijing, Peoples R China
关键词
cryptography; computer network security; access protocols; IP networks; authorisation; multiaddress generation; duplicate address detection; Neighbour Discovery Protocol; Address Resolution Protocol; Internet Protocol address configuration; IP address; medium access control address; DAD; malicious node attacks; MAGD multiple address configuration; DoS prevention; IPv6;
D O I
10.1049/iet-com.2018.5686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Neighbour Discovery Protocol and the Address Resolution Protocol are important protocols in the data link layer. Their functions include Internet Protocol (IP) address configuration, resolving the correspondence between an IP address and a medium access control address, and duplicate address detection (DAD). In DAD, the new address that the node is going to use is public, and thus, it is vulnerable to malicious node attacks. Moreover, address configuration is inefficient because only one address is generated and detected each time. In this study, the authors propose a multi-address generation and DAD scheme called MAGD. MAGD generates a set of addresses each time, but only discloses a part of the set during DAD, thereby reducing the risk of being attacked. DAD will only fail when all the addresses are in conflict, and thus, the efficiency of node's address configuration is enhanced. Experiments show that the additional overhead in the CPU and memory caused by MAGD's multiple address configuration is within an acceptable range. When subjected to denial-of-service (DoS) attacks, MAGD performs better than traditional encryption schemes.
引用
收藏
页码:1390 / 1396
页数:7
相关论文
共 50 条
  • [41] Lightweight Address Hopping for Defending the IPv6 IoT
    Aljosha, Judmayer
    Johanna, Ullrich
    Georg, Merzdovnik
    Artemios, Voyiatzis G.
    Edgar, Weippl
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [42] Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network
    Al-Ani, Ahmed K.
    Anbar, Mohammed
    Al-Ani, Ayman
    Ibrahim, Dyala R.
    IEEE ACCESS, 2020, 8 : 27122 - 27138
  • [43] Context-Aware IPv6 Address Hopping
    Marx, Matthias
    Schwarz, Monina
    Blochberger, Maximilian
    Wille, Frederik
    Federrath, Hannes
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 539 - 554
  • [44] Global IPv6 anycast address lookup with NP
    Karuppiah, EK
    Abdullah, R
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1106 - 1110
  • [45] Comparative studies of address lookup algorithms for IPv6
    Li, YK
    Pao, D
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U285 - U290
  • [46] Taming the IPv6 Address Space with Hyhoneydv6
    Schindler, Sven
    Schnor, Bettina
    Scheffler, Thomas
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 113 - 118
  • [47] Distributed IPv6 Address Configuration for Hybrid MANETs
    Wang, Xiaonan
    Le, Deguang
    Cheng, Hongbin
    AD HOC & SENSOR WIRELESS NETWORKS, 2016, 33 (1-4) : 153 - 171
  • [48] A secure IPv6 address configuration scheme for a MANET
    Wang, Xiaonan
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 777 - 789
  • [49] IPv6 stateless address autoconfiguration considered harmful
    Lindqvist, Janne
    MILCOM 2006, VOLS 1-7, 2006, : 370 - 374
  • [50] A Survey on IPv6 Address Structure Standardization Researches
    Zhang Q.-L.
    Jiang C.-P.
    Wang J.-L.
    Li X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (06): : 1384 - 1405