2019
DOI: 10.1371/journal.pone.0214518
|View full text |Cite
|
Sign up to set email alerts
|

DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network

Abstract: An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network’s functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design’s functions are exposed to security threats like the DAD process, which is vulnerable to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…However, there hasn't been much discussion about how to apply diligent checking operations in actual applications. As a result, following the previous successful applications of the Match-prevention technique for preventing DAD by Al-Ani et al [7] and the DAD-match technique by Al-Ani et al [16] for securing DAD, and motivated by the works of [1][2][3][4][5], this paper presents an Initial Neighbor Inspection approach to DAD operation by establishing an initial round of verification of the nodes on the same link before a broadcast request on the existence.…”
Section: Related Workmentioning
confidence: 81%
“…However, there hasn't been much discussion about how to apply diligent checking operations in actual applications. As a result, following the previous successful applications of the Match-prevention technique for preventing DAD by Al-Ani et al [7] and the DAD-match technique by Al-Ani et al [16] for securing DAD, and motivated by the works of [1][2][3][4][5], this paper presents an Initial Neighbor Inspection approach to DAD operation by establishing an initial round of verification of the nodes on the same link before a broadcast request on the existence.…”
Section: Related Workmentioning
confidence: 81%
“…Still, they involve complex cryptographic techniques unsuitable for resource-constrained environments. Authentication-based schemes 52,61,62 require an additional authentication system to authorize the participation of various components in the DAD process, which is tedious and violates the SLAAC standard. Detection and defense mechanisms 46,55,58,60,[64][65][66][67] use intelligent techniques to identify and take defensive actions against malicious nodes, but they require additional development and implementation and cannot prevent all attacks.…”
Section: Dad Solutions To Mitigate Dos Attacksmentioning
confidence: 99%
“…Al-Ani et al [22] proposed an alternative DAD method to address the DoS attack during the DAD process in the IPv6 network. DAD-match have introduced two new NDP message types known as NS-match and NA-match.…”
Section: Related Workmentioning
confidence: 99%
“…Song and Ji [21] DAD-h i) vulnerable to hash collision attack because using MD5, ii) suffers from Dos attack, and iii) only implemented for neighbor discovery, not for RD. Al-Ani et al [22] DAD-match i) suffers from pre-image attack; ii) has lower hash power, and iii) only implemented for neighbor discovery not for RD. Praptodiyono et al [23] Trust-ND i) the hash collision attack can be used against the SHA-1 hashing algorithm, ii) unreliable generation of trust value, iii) vulnerable to DoS attack, and iv) complex processing overhead.…”
mentioning
confidence: 99%