By Topic

An improved SEND protocol against DoS attacks in Mobile IPv6 environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Meigen Huang ; Chongqing Univ. of Posts & Telecommun., Chongqing, China ; Jianrong Liu ; Yunjie Zhou

Neighbor discovery protocol can be used to communicate between neighboring nodes in the mobile IPv6 environment. For a secure neighbor discovery protocol, the IETF SEND working group standardized a secure neighbor discovery protocol, and a cryptographically generated address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, denial-of-service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of secure neighbor discovery protocol in mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.

Published in:

Network Infrastructure and Digital Content, 2009. IC-NIDC 2009. IEEE International Conference on

Date of Conference:

6-8 Nov. 2009