2018
DOI: 10.1155/2018/1816462
|View full text |Cite
|
Sign up to set email alerts
|

Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks

Abstract: In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…normal and attack) to evaluate the proposed Match-Prevention technique and check whether it fulfils the study requirements. These metrics, including processing time, bandwidth consumption and DoS prevention success rate, were the same as those used in previous researches [20], [25], [39].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…normal and attack) to evaluate the proposed Match-Prevention technique and check whether it fulfils the study requirements. These metrics, including processing time, bandwidth consumption and DoS prevention success rate, were the same as those used in previous researches [20], [25], [39].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…While evaluating the technique it, there is an issue with bandwidth consumption and processing time that cannot be accepted in order to protect DAD from denial of service (DoS) attack. The authors of El Ksimi and Leghris [12] presented a solution for protecting a target IPv6 address by employing a combination of strong hash key and robust encryption technology, which was to be employed before transmitting any NS messages, in a similar vein. The outcome demonstrates that a good security mechanism has been put in place, but the computing complexity is extremely high.…”
Section: Related Workmentioning
confidence: 99%
“…It is worth noting that the aforementioned previous research works [7][8][9][10][11][12][13][14][15] continue to place an emphasis on theoretical information on DAD as well as the blocking access of transmission sessions that does not involve in the DAD processes. However, there hasn't been much discussion about how to apply diligent checking operations in actual applications.…”
Section: Related Workmentioning
confidence: 99%
“…Models that utilize identity-based cryptography, [14] DNS hierarchies, [15] time-slotted channel hopping (TSCH), [16] network-aware internet-wide scan, [17] privacy-preserving communication schemes, [18] non-batch verification method scheme (NBVMS), [19] and efficient, secure, and privacypreserving proxy mobile IPv6 (ESP-PMIPv6) [20] are also discussed; these models help optimize security along with quality of service while These models, which have a high level of complexity, are not suitable for use in network configurations that call for simplified addressing schemes because of the level of complexity they possess. The research presented in [21][22][23] suggests the use of low-power lossy networks, fast handovers for mobile IPv6 (FMIPv6), and block chains.…”
Section: Background and Related Workmentioning
confidence: 99%