Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.11889/4359
DC FieldValueLanguage
dc.contributor.authorAlSa'deh, Ahmad
dc.contributor.authorRafiee, Hosnieh
dc.contributor.authorMeinel, Christoph
dc.date.accessioned2017-03-02T08:19:20Z
dc.date.available2017-03-02T08:19:20Z
dc.date.issued2012
dc.identifier.urihttp://hdl.handle.net/20.500.11889/4359
dc.description.abstractCryptographically Generated Addresses (CGAs) were mainly designed to prove address ownership and to prevent the theft of existing IPv6 addresses by binding the owner’s public key to the generated address. The address owner uses a corresponding private key to prove its ownership by using signed messages that are originated from that address. Though the CGA approach is quite useful in providing a means of proving address ownership in IPv6 networks, it does have some limitations and some vulnerabilities. In this paper we will provide a security analysis and descriptions of possible ways of attacking CGA. We found that the CGA verification process is prone mainly to Denial-of-Service (DoS) attacks. We also found that CGAs are still susceptible to privacy related attacks. We will therefore propose some extensions to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more privacy-consciousen_US
dc.language.isoen_USen_US
dc.subjectComputer networks - Security measuresen_US
dc.subjectTCP/IP (Computer network protocol)en_US
dc.titleCryptographically generated addresses (CGAs): possible attacks and proposed mitigation approachesen_US
dc.typeArticleen_US
newfileds.departmentEngineering and TechnologyEngineering and Technologyen_US
newfileds.item-access-typeopen_accessen_US
newfileds.thesis-prognoneen_US
newfileds.general-subjectnoneen_US
item.languageiso639-1other-
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:Fulltext Publications
Files in This Item:
File Description SizeFormat
2012_Alsadeh_CIT.pdf536.27 kBAdobe PDFView/Open
Show simple item record

Page view(s)

35
Last Week
0
Last month
2
checked on Jul 12, 2022

Download(s)

16
checked on Jul 12, 2022

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.