A new concept of duplicate address detection processes in IPv6 link-local network

AA Ibrahim, RAA Abdulghafor, S Wani - International Journal of …, 2022 - ijic.utm.my
AA Ibrahim, RAA Abdulghafor, S Wani
International Journal of Innovative Computing, 2022ijic.utm.my
Abstract The Neighbor Discovery Protocol (NDP) enables nodes on the same IPv6 link to
advertise their existence to their neighbors and learn about their neighbors' existences in an
IPv6 link-local network. Duplicate Address Detection (DAD) on NDP is used to determine
whether or not an address requested by a node is already in use by another node. The
Neighbor Solicitation (NS) and Neighbor Advertisement (NA) operations are associated to
DAD checks in order to ensure that each interface within the transmission session is unique …
Abstract
The Neighbor Discovery Protocol (NDP) enables nodes on the same IPv6 link to advertise their existence to their neighbors and learn about their neighbors’ existences in an IPv6 link-local network. Duplicate Address Detection (DAD) on NDP is used to determine whether or not an address requested by a node is already in use by another node. The Neighbor Solicitation (NS) and Neighbor Advertisement (NA) operations are associated to DAD checks in order to ensure that each interface within the transmission session is unique. Unfortunately, NS and NA operations have a significant disadvantage in that they are based on insecure architectures and lack verification procedures for determining whether incoming messages originate from a valid or illegitimate node. This will eventually allow any node in the same link to be manipulated during NS and NA message transmission sessions. Despite some attempts to secure the entire NDP operations, they still suffer from computing resources requirement for their operations. As a result, this study proposes an Initial Neighbor Inspection (INI) on DAD operation. The proposed techniques allow for an initial round of verification of the nodes on the same link before a broadcast request on the existence of neighbors, which is followed by another round of learning about neighbors’ existences. Conclusively, using this idea, as a simple verification will indicate the presence of neighbors, we may restrict solicitation and advertising to only those who are eligible. This means that the computational processing time for NS and NA on DAD operations would not rise.
ijic.utm.my
以上显示的是最相近的搜索结果。 查看全部搜索结果