MILCOM 2007 - IEEE Military Communications Conference 2007
DOI: 10.1109/milcom.2007.4455200
|View full text |Cite
|
Sign up to set email alerts
|

Internet Protocol Version 6 (IPv6) Protocol Security Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…• Failure of DAD and NUD processes: A malicious router can falsely respond to the DAD requests and prevent a new node from joining the link. Thus a router will respond to a false NUD (Neighbor Unreachability Detection [9].…”
Section: Iva3 Auto Configurationmentioning
confidence: 99%
“…• Failure of DAD and NUD processes: A malicious router can falsely respond to the DAD requests and prevent a new node from joining the link. Thus a router will respond to a false NUD (Neighbor Unreachability Detection [9].…”
Section: Iva3 Auto Configurationmentioning
confidence: 99%
“…ICMPv6 detects faults discovered when processing packets [11,12] and performs additional internet-layer functions such as diagnostics. ICMPv6 has two sorts of messages: error notification and information notification, which are used in router advertisement and neighbour solicitation [2] processes that define relationships between neighbouring nodes by using type and code fields to distinguish services, both of which are susceptible to denial-of-service (DoS), Man-in-the-Middle (MITM), and spoofing attacks [13,14]. Fields with empty values in ICMPv6 packets can be used in the future [15].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, every node implement-ing IPv6 must support six extension headers such as Hopby-Hop Options, Routing, Fragment, Destination Options, Authentication Header (AH), and Encapsulating Security Payload (ESP). This feature is vulnerable to DoS as by flooding of intentionally syntactically or semantically incorrect extensions invoke the ICMPv6 "Parameter Problem" message (ICMPv6 message type value 4) and may consume the target's resources [27].…”
Section: Introductionmentioning
confidence: 99%