2015 9th Asia Modelling Symposium (AMS) 2015
DOI: 10.1109/ams.2015.28
|View full text |Cite
|
Sign up to set email alerts
|

Improving Security of Duplicate Address Detection on IPv6 Local Network in Public Area

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 13 publications
0
4
0
1
Order By: Relevance
“…e address configuration is conducted using the standard IPv6 address configuration, such as stateless address configuration as specified in RFC 4862 [56] and stateful address configuration using DHCPv6 standardized in RFC 3315 [57]. However, the new CoA is not permanent until the MN runs duplicate address detection (DAD) [58]. If there is no duplicate address detected, the MN updates its location.…”
Section: Address Configuration Once a New Access Router Ismentioning
confidence: 99%
“…e address configuration is conducted using the standard IPv6 address configuration, such as stateless address configuration as specified in RFC 4862 [56] and stateful address configuration using DHCPv6 standardized in RFC 3315 [57]. However, the new CoA is not permanent until the MN runs duplicate address detection (DAD) [58]. If there is no duplicate address detected, the MN updates its location.…”
Section: Address Configuration Once a New Access Router Ismentioning
confidence: 99%
“…In this type of attack the victim assumes that all nodes are local. This is simply happened because attacker killed the default router, either by launching a DoS attack against the router or sends a spoofed RA message with zero life time and make default router list empty (Praptodiyono et al, 2015b). Consequently and according to RFC 2461 victim will never send packets to the default router, as per Fig.…”
Section: Default Router Is Killedmentioning
confidence: 99%
“…Another method was used in [12] to secure the DAD; it is called trust-ND. It is used to detect fake NA messages.…”
Section: Related Workmentioning
confidence: 99%