Abstract
Communications using IPv6 over the Internet represent a very minimal rate of all communications. For example, users accessing Google in IPv6 account for only 20.69% of all connections. However, these communications are often present in the majority of local networks, either officially, and after protocol deployment by the administrators, or in the form of “unofficial” traffic using the addresses automatically generated by the nodes of the network. This last case is often neglected by administrators, even if it can be a source of attacks against the network. In this paper, we proposed a new mechanism to secure the messages used in the DAD process, and we compare the results by using two hash functions. Overall, the experimental results show a significant effect in term of execution time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alisherov, F., Kim, T.: Duplicate address detection table in IPv6 mobile networks. In: Chang, C.C., Vasilakos, T., Das, P., Kim, T., Kang, B.H., Khurram Khan, M. (eds.) Advanced Communication and Networking. CCIS, vol 77. Springer, Heidelberg (2010)
Barbhuiya, F.A., Bansal, G., Kumar, N., et al.: Detection of neighbor discovery protocol based attacks in IPv6 network. Networking Sci. 2(3–4), 91–113 (2013)
Wang, X., Mu, Y., Han, G., Le, D.: A secure IPv6 address configuration protocol for vehicular networks. Wirel. Pers. Commun. 79(1), 721–744 (2014)
Hassan, Rosilah, Ahmed, A.S., Othman, N.F.: Enhancing security for IPv6 neighbor discovery protocol using cryptography. Am. J. Appl. Sci. 11(9), 1472–1479 (2014)
Aggarwal, S., Aggarwal, S., Aggarwal, K.: A review of comparative study of MD5 and SHA security algorithm. Int. J. Comput. Appl. (0975 – 8887) 104(14), 1–4 (2014)
Shah, J.L., Parvez, J.: Optimizing security and address configuration in IPv6 SLAAC. Procedia Comput. Sci. 54, 177–185 (2015)
Ibrahim, R.K., et al.: Implementation of secure hash algorithm sha-1 by labview. Int. J. Comput. Sci. Mob. Comput. 4(3), 61–67 (2015)
Moslehpour, M., Khorsandi, S.: A distributed cryptographically generated address computing algorithm for secure neighbor discovery protocol in IPv6. Int. J. Comput. Inf. Eng. 10(6) (2016)
Shah, J.L.: A novel approach for securing IPv6 link local communication. Inf. Secur. J. Global Perspect. (2016). ISSN: 1939-3555
Anbar, M., Abdullah, R., Saad, R.M.A., Alomari, E., Alsaleem, S.: Review of security vulnerabilities in the IPv6 neighbor discovery protocol. In: Information Science and Applications (ICISA), pp. 603–612 (2016)
Shah, J.L., Parvez, J.: IPv6 cryptographically generated address: analysis and optimization. In: AICTC 2016 Proceedings of the International Conference on Advances in Information Communication Technology & Computing, 12–13 August 2016
Abdoun, N., et al.: Secure hash algorithm based on efficient chaotic neural network. IEEE, 04 August 2016
Praptodiyono, S., et al.: Improving security of duplicate address detection on IPv6 local network in public area, 31 October 2016, ISSN: 2376-1172
Lu, Y., Wang, M., Huang, P.: An SDN-based authentication mechanism for securing neighbor discovery protocol in IPv6. J. Secur. Commun. Networks 2017, 9 (2017)
Gont, F., Cooper, A., Thaler, D., Liu, W.: Recommendation on stable IPv6 interface identifiers. IETF, RFC 8064, February 2017
Sridevi: Implementation of multicast routing on IPv4 and IPv6 networks. Int. J. Recent Innov. Trends Comput. Commun., 1455–1467, June 2017. ISSN: 2321-8169
Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) specification. IETF, RFC 8200, July 2017
Ahmed, A.S., Ahmed, M.S., Hassan, R., Othman, N.E.: IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey. Electronic, 30 August 2017, ISSN: 2169-3536
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
El Ksimi, A., Leghris, C. (2019). A New IPv6 Security Approach for a Local Network. In: Khoukhi, F., Bahaj, M., Ezziyyani, M. (eds) Smart Data and Computational Intelligence. AIT2S 2018. Lecture Notes in Networks and Systems, vol 66. Springer, Cham. https://doi.org/10.1007/978-3-030-11914-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-11914-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11913-3
Online ISBN: 978-3-030-11914-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)