Skip to Main Content
Neighbor discovery protocol can be used to communicate between neighboring nodes in the mobile IPv6 environment. For a secure neighbor discovery protocol, the IETF SEND working group standardized a secure neighbor discovery protocol, and a cryptographically generated address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, denial-of-service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of secure neighbor discovery protocol in mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.