2003
DOI: 10.1016/s1389-1286(02)00326-2
|View full text |Cite
|
Sign up to set email alerts
|

A secure address resolution protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(35 citation statements)
references
References 8 publications
0
35
0
Order By: Relevance
“…In [6], the authors assume that there is a database deployed in the LAN which can be used to resolve the MAC address. However, this approach does not succeed with dynamic networks in which many nodes join and leave the network daily, where each node should be registered in the database before it can work.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [6], the authors assume that there is a database deployed in the LAN which can be used to resolve the MAC address. However, this approach does not succeed with dynamic networks in which many nodes join and leave the network daily, where each node should be registered in the database before it can work.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, this approach requires modifying the existing ARP protocol which is unpractical. Similarly, the authors of [11] suggested a protocol that requires modifying the ARP protocol to solve uncertified ARP table renewal from an ARP reply.…”
Section: Related Workmentioning
confidence: 99%
“…The Secure Address Resolution Protocol (Gouda & Huang, 2003) (S-ARP) has been designed to secure networks that use ARP against attacks like ARP poisoning. ARP poisoning is where an attacker corrupts ARP caches of hosts in a network by sending faked ARP replies.…”
Section: Related Workmentioning
confidence: 99%
“…One of such approaches is replacing the ARP protocol with a new protocol that involves a secure server [56]. The secure server keeps the IP to MAC address mapping database and shares secret keys with all nodes.…”
Section: Arp Attacksmentioning
confidence: 99%