Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.11889/4359
DC Field | Value | Language |
---|---|---|
dc.contributor.author | AlSa'deh, Ahmad | |
dc.contributor.author | Rafiee, Hosnieh | |
dc.contributor.author | Meinel, Christoph | |
dc.date.accessioned | 2017-03-02T08:19:20Z | |
dc.date.available | 2017-03-02T08:19:20Z | |
dc.date.issued | 2012 | |
dc.identifier.uri | http://hdl.handle.net/20.500.11889/4359 | |
dc.description.abstract | Cryptographically Generated Addresses (CGAs) were mainly designed to prove address ownership and to prevent the theft of existing IPv6 addresses by binding the owner’s public key to the generated address. The address owner uses a corresponding private key to prove its ownership by using signed messages that are originated from that address. Though the CGA approach is quite useful in providing a means of proving address ownership in IPv6 networks, it does have some limitations and some vulnerabilities. In this paper we will provide a security analysis and descriptions of possible ways of attacking CGA. We found that the CGA verification process is prone mainly to Denial-of-Service (DoS) attacks. We also found that CGAs are still susceptible to privacy related attacks. We will therefore propose some extensions to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more privacy-conscious | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Computer networks - Security measures | en_US |
dc.subject | TCP/IP (Computer network protocol) | en_US |
dc.title | Cryptographically generated addresses (CGAs): possible attacks and proposed mitigation approaches | en_US |
dc.type | Article | en_US |
newfileds.department | Engineering and TechnologyEngineering and Technology | en_US |
newfileds.item-access-type | open_access | en_US |
newfileds.thesis-prog | none | en_US |
newfileds.general-subject | none | en_US |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | other | - |
Appears in Collections: | Fulltext Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2012_Alsadeh_CIT.pdf | 536.27 kB | Adobe PDF | View/Open |
Page view(s)
104
Last Week
0
0
Last month
2
2
checked on Apr 14, 2024
Download(s)
41
checked on Apr 14, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.