2021
DOI: 10.1007/978-981-16-8059-5_15
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network

Abstract: I would like to express my unlimited gratitude to God and Guru who bestowed me inner with strength, good health, a clear mind and a conducive environment to conduct my research and complete this thesis. I would like to extend my gratitude to all my family members especially my parents late Mr Arjuman and Madam Suppamah, my dearest wife Meena Munusamy and her parents as well as, my daughters Poomagal and Koomagal for their love, untiring support and cooperation that helped me to complete this research work. I a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Arjuman et al [21] proposed an authentication framework to enhance the security of NDP. Their approach leveraged the multicast key management protocol as an application layer key management scheme to address the multicast problem in neighbor communication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Arjuman et al [21] proposed an authentication framework to enhance the security of NDP. Their approach leveraged the multicast key management protocol as an application layer key management scheme to address the multicast problem in neighbor communication.…”
Section: Related Workmentioning
confidence: 99%
“…Queue Length: Longer queues at the nodes imply traffic accumulation and possible congestion. Techniques like FLCC [21] employ queue length to detect congestion. Rate limiting provides immediate congestion relief but can impact throughput.…”
mentioning
confidence: 99%
“…However, the SEND mechanism is not widely used. Arjuman N C. [4] introduced an authentication mechanism to improve the security of NDP. The proposed framework uses the multicast key management protocol as an application layer key management scheme to solve the multicast problem in neighbor communication.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…When two hosts start communication, it is necessary to know the MAC address of the communicating host. In IPv4 communication, the Address Resolution Protocol (ARP) [4] is required to look up the MAC address for a given IP address. Meanwhile, in IPv6 communication, the NDP [5] protocol is responsible for the lookup of the MAC address, which lacks authentication.…”
Section: Introductionmentioning
confidence: 99%