2015 International Conference on Electrical Engineering and Informatics (ICEEI) 2015
DOI: 10.1109/iceei.2015.7352509
|View full text |Cite
|
Sign up to set email alerts
|

Improving security for IPv6 neighbor discovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…The DoS is believed to be the second category of NDP vulnerabilities. The preventions of information flow between the attacked nodes and all other nodes, performed by malicious nodes, are likely to describe this type of attack (Ahmed et al, 2015a). The communication is also disallowed between the attacked nodes and specific intended addresses.…”
Section: Ndp Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The DoS is believed to be the second category of NDP vulnerabilities. The preventions of information flow between the attacked nodes and all other nodes, performed by malicious nodes, are likely to describe this type of attack (Ahmed et al, 2015a). The communication is also disallowed between the attacked nodes and specific intended addresses.…”
Section: Ndp Vulnerabilitiesmentioning
confidence: 99%
“…The communication is also disallowed between the attacked nodes and specific intended addresses. Thirdly, the NDP is encountered by the attack of Flooding DoS (Ahmed et al, 2015b). The malicious nodes direct the traffic of other hosts to the victim node in such attack.…”
Section: Ndp Vulnerabilitiesmentioning
confidence: 99%
“…During address autoconfiguration in IPv6 link local network, Internet control message protocol (ICMPv6) [9] message types are used by the hosts to communicate with neighboring hosts within a local link. However, studies [10,11] have shown that ICMPv6 messages are vulnerable to denial of service (DoS) attacks, especially during duplicate address detection (DAD) process while host(s) attempts to configure its own generated interface identifier (IID).…”
Section: A Denial Of Service Attacks On Ipv6 Networkmentioning
confidence: 99%
“…Despite its many advantages, since it is assumed that every node in a link trusts the other, NDP is greatly susceptible to severe attacks. Nevertheless, there are instances where this assumption does not hold true, such as when wireless networks are utilized [5]. Malicious users can forge NDP messages by pretending to be legitimate nodes with the intention of attacking the protocol [6].…”
Section: Introductionmentioning
confidence: 99%