2017
DOI: 10.1109/access.2017.2737524
|View full text |Cite
|
Sign up to set email alerts
|

IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(14 citation statements)
references
References 82 publications
0
9
0
Order By: Relevance
“…Countermeasures include the use of compressed transport protocols, for instance datagrams transport layer security (DTLS) [72]. The threats against the neighbor discovery protocol (NDP) are presented in [75]. In this work, a detailed description of the operation and the most common attacks towards NDP is performed.…”
Section: Protocols Attacksmentioning
confidence: 99%
“…Countermeasures include the use of compressed transport protocols, for instance datagrams transport layer security (DTLS) [72]. The threats against the neighbor discovery protocol (NDP) are presented in [75]. In this work, a detailed description of the operation and the most common attacks towards NDP is performed.…”
Section: Protocols Attacksmentioning
confidence: 99%
“…AR, DAD, etc.) and disturb this process by manipulating the messages and carrying out a DoS attack [10]. The section below discusses the vulnerabilities to a DoS attack of two common NDP processes performed frequently from each of the IPv6 hosts in the network.…”
Section: Neighbour Discovery Protocolmentioning
confidence: 99%
“…The IP address of a host is just an abstract network layer address. If a host wants to transmit the network layer's packet to the target host, then the packet needs to be converted into a MAC frame that can be sent to the actual network [10]. Therefore, regardless of whatever protocols the network layer used, the physical address of the target in the data-link layer must be known to achieve transmission.…”
Section: Address Resolution Process and Its Security Challengesmentioning
confidence: 99%
See 2 more Smart Citations