Skip to main content

A New IPv6 Security Approach for a Local Network

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 66))

Abstract

Communications using IPv6 over the Internet represent a very minimal rate of all communications. For example, users accessing Google in IPv6 account for only 20.69% of all connections. However, these communications are often present in the majority of local networks, either officially, and after protocol deployment by the administrators, or in the form of “unofficial” traffic using the addresses automatically generated by the nodes of the network. This last case is often neglected by administrators, even if it can be a source of attacks against the network. In this paper, we proposed a new mechanism to secure the messages used in the DAD process, and we compare the results by using two hash functions. Overall, the experimental results show a significant effect in term of execution time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alisherov, F., Kim, T.: Duplicate address detection table in IPv6 mobile networks. In: Chang, C.C., Vasilakos, T., Das, P., Kim, T., Kang, B.H., Khurram Khan, M. (eds.) Advanced Communication and Networking. CCIS, vol 77. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Barbhuiya, F.A., Bansal, G., Kumar, N., et al.: Detection of neighbor discovery protocol based attacks in IPv6 network. Networking Sci. 2(3–4), 91–113 (2013)

    Article  Google Scholar 

  3. Wang, X., Mu, Y., Han, G., Le, D.: A secure IPv6 address configuration protocol for vehicular networks. Wirel. Pers. Commun. 79(1), 721–744 (2014)

    Article  Google Scholar 

  4. Hassan, Rosilah, Ahmed, A.S., Othman, N.F.: Enhancing security for IPv6 neighbor discovery protocol using cryptography. Am. J. Appl. Sci. 11(9), 1472–1479 (2014)

    Article  Google Scholar 

  5. Aggarwal, S., Aggarwal, S., Aggarwal, K.: A review of comparative study of MD5 and SHA security algorithm. Int. J. Comput. Appl. (0975 – 8887) 104(14), 1–4 (2014)

    MATH  Google Scholar 

  6. Shah, J.L., Parvez, J.: Optimizing security and address configuration in IPv6 SLAAC. Procedia Comput. Sci. 54, 177–185 (2015)

    Article  Google Scholar 

  7. Ibrahim, R.K., et al.: Implementation of secure hash algorithm sha-1 by labview. Int. J. Comput. Sci. Mob. Comput. 4(3), 61–67 (2015)

    MathSciNet  Google Scholar 

  8. Moslehpour, M., Khorsandi, S.: A distributed cryptographically generated address computing algorithm for secure neighbor discovery protocol in IPv6. Int. J. Comput. Inf. Eng. 10(6) (2016)

    Google Scholar 

  9. Shah, J.L.: A novel approach for securing IPv6 link local communication. Inf. Secur. J. Global Perspect. (2016). ISSN: 1939-3555

    Google Scholar 

  10. Anbar, M., Abdullah, R., Saad, R.M.A., Alomari, E., Alsaleem, S.: Review of security vulnerabilities in the IPv6 neighbor discovery protocol. In: Information Science and Applications (ICISA), pp. 603–612 (2016)

    Google Scholar 

  11. Shah, J.L., Parvez, J.: IPv6 cryptographically generated address: analysis and optimization. In: AICTC 2016 Proceedings of the International Conference on Advances in Information Communication Technology & Computing, 12–13 August 2016

    Google Scholar 

  12. Abdoun, N., et al.: Secure hash algorithm based on efficient chaotic neural network. IEEE, 04 August 2016

    Google Scholar 

  13. Praptodiyono, S., et al.: Improving security of duplicate address detection on IPv6 local network in public area, 31 October 2016, ISSN: 2376-1172

    Google Scholar 

  14. Lu, Y., Wang, M., Huang, P.: An SDN-based authentication mechanism for securing neighbor discovery protocol in IPv6. J. Secur. Commun. Networks 2017, 9 (2017)

    Google Scholar 

  15. Gont, F., Cooper, A., Thaler, D., Liu, W.: Recommendation on stable IPv6 interface identifiers. IETF, RFC 8064, February 2017

    Google Scholar 

  16. Sridevi: Implementation of multicast routing on IPv4 and IPv6 networks. Int. J. Recent Innov. Trends Comput. Commun., 1455–1467, June 2017. ISSN: 2321-8169

    Google Scholar 

  17. Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) specification. IETF, RFC 8200, July 2017

    Google Scholar 

  18. Ahmed, A.S., Ahmed, M.S., Hassan, R., Othman, N.E.: IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey. Electronic, 30 August 2017, ISSN: 2169-3536

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali El Ksimi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Ksimi, A., Leghris, C. (2019). A New IPv6 Security Approach for a Local Network. In: Khoukhi, F., Bahaj, M., Ezziyyani, M. (eds) Smart Data and Computational Intelligence. AIT2S 2018. Lecture Notes in Networks and Systems, vol 66. Springer, Cham. https://doi.org/10.1007/978-3-030-11914-0_2

Download citation

Publish with us

Policies and ethics