Unknown

Dataset Information

0

Novel Duplicate Address Detection with Hash Function.


ABSTRACT: Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the "Hash_64" field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution.

SUBMITTER: Song G 

PROVIDER: S-EPMC4798648 | biostudies-literature | 2016

REPOSITORIES: biostudies-literature

altmetric image

Publications

Novel Duplicate Address Detection with Hash Function.

Song GuangJia G   Ji ZhenZhou Z  

PloS one 20160318 3


Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is la  ...[more]

Similar Datasets

| S-EPMC3386278 | biostudies-literature
| S-EPMC4355816 | biostudies-literature
| S-EPMC9748815 | biostudies-literature
| S-EPMC1570150 | biostudies-literature
| S-EPMC10703029 | biostudies-literature
| S-EPMC8078758 | biostudies-literature
| S-EPMC4032675 | biostudies-other
| S-EPMC4895151 | biostudies-literature
| S-EPMC9318546 | biostudies-literature
| S-EPMC8777787 | biostudies-literature