Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.11889/4360
DC Field | Value | Language |
---|---|---|
dc.contributor.author | AlSa'deh, Ahmad | |
dc.contributor.author | Meinel, Christoph | |
dc.date.accessioned | 2017-03-02T08:35:56Z | |
dc.date.available | 2017-03-02T08:35:56Z | |
dc.date.issued | 2012 | |
dc.identifier.uri | http://hdl.handle.net/20.500.11889/4360 | |
dc.description | Published in : IEEE security & Privacy Magazine, vol. 10, no. 4, pp. 26-34, Aug. 2012 | |
dc.description.abstract | Neighbor Discovery Protocol (NDP), one of the main protocols in the IPv6 suite, comprises Neighbor Discovery for IPv6 (Request for Comments [RFC] 48611) and IPv6 stateless address autoconfiguration (SLAAC).2 It’s used for several critical functionalities, such as discovering nodes on the same link, determining link-layer addresses, detecting duplicate addresses, finding routers, and maintaining reachability information about paths to an active neighbor. In addition, NDP plays a crucial role in mobile IPv6 (MIPv6) networks, eliminating the need for foreign agents and allowing mobile nodes to join new foreign networks. However, NDP is prone to critical attacks assumes that all nodes on the link trust each other, but this assumption doesn’t hold for several scenarios, such as over a wireless network, in which anyone can join a local link with minimal or no link-layer authentication. Consequently, malicious users could impersonate legitimate nodes by forging NDP messages to generate attacks. As a result, RFC 3971, “Secure Neighbor Discovery (SEND),” became a standard.4 SEND uses cryptographically generated addresses(CGAs),5 a digital signature, and an X.509 certification to protect NDP. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Routers (Computer networks) | en_US |
dc.subject | Internetworking (Telecommunication) | en_US |
dc.subject | Computer network - Security measures | en_US |
dc.title | Secure Neighbor Discovery : review, challenges, perspectives, and recommendations | en_US |
dc.type | Article | en_US |
newfileds.department | Engineering and Technology | en_US |
newfileds.item-access-type | open_access | en_US |
newfileds.thesis-prog | none | en_US |
newfileds.general-subject | none | en_US |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | other | - |
item.grantfulltext | open | - |
Appears in Collections: | Fulltext Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2012_Alsadeh_SecurityPrivacy.pdf | 3.35 MB | Adobe PDF | View/Open |
Page view(s)
124
Last Week
0
0
Last month
2
2
checked on Mar 25, 2024
Download(s)
256
checked on Mar 25, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.