Abstract

Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent those malicious nodes from sending spoof reply by securing both NS and NA messages. The proposed Advanced Bits Security (ABS) technique is based on Blake2 algorithm and introducing a creative option called ABS field that holds the hash value of tentative IP address and attached to both NA and NS message. We expect the ABS technique can prevent spoof reply during DAD procedure in link local network and can prevent DoS attack

Highlights

  • IP address is used to uniquely identify every node in a network

  • In this study of the development, our research aims to propose a technique by introducing some changes in the original Neighbor Solicitation (NS) and Neighbor Advertisement (NA) messages format design

  • Among MD5, SHA-1, SHA-2 and SHA-3, they consider SHA-2 is comparatively better than any other hashing function [16], though SHA-3 is the latest among them

Read more

Summary

Introduction

IP address is used to uniquely identify every node in a network. Unlike IPv4, IPv6 operates a 128-bit address that Theoretically allowing 2128 or approximately 3.4×1038 addresses [1]. Google statistics on 25th may, 2019 shows the percentage of users reaching Google service over IPv6 28.25% compared with IPv4 [2]. IPv6 introduced simpler header format and novel mechanisms such as neighbor discovery concept and address auto configuration [3]. Md. Mustafejur Rahman, Student and Researcher, Department of Electronics and Communication Engineering, Hajee Mohammad Danesh

Objectives
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.