A stateless spatial IPv6 address configuration scheme for internet of things

G Kumar, P Tomar - IETE Journal of Research, 2023 - Taylor & Francis
The Internet of Things (IoT) is going to create a heterogeneous network of billions or trillions
of connected things with self-aware, self-configuration capabilities that will exchange data …

IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks

G Kumar, A Gankotiya, SS Rawat, B Balusamy… - Scientific Reports, 2024 - nature.com
With technology development, the growing self-communicating devices in IoT networks
require specific naming and identification, mainly provided by IPv6 addresses. The IPv6 …

IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone

G Kumar, Pragya - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
The fusion of drones with the Internet, termed the Internet of Drones (IoD), resembles the
Internet of Things (IoT) paradigm. In IoD, drones necessitate unique identifiers similar to IPv6 …

IPv6 Addressing Strategy for IoT Network: A Comprehensive Review

B Kumar - 2023 International Conference on Sustainable …, 2023 - ieeexplore.ieee.org
IPv6 addressing has become increasingly important with the rapid emergence of the Internet
of Things (IoT) due to the depletion of IPv4 addresses. Allocating IPv6 in the IoT is …

IPv6 addressing scheme to enhance the performance by mitigating reconnaissance attack

Pragya, B Kumar - Internet Technology Letters, 2023 - Wiley Online Library
In resource‐constrained networks, IPv6 addresses are assigned to devices using SLAAC‐
based EUI‐64, which generates unique addresses. However, the constant interface …

Building IPv6 addressing scheme using Hybrid Duplicate Address Detection to prevent Denial of Service Attack

A Gankotiya, V Kumar, KS Vaisla - Computers and Electrical Engineering, 2024 - Elsevier
Abstract Internet Protocol version 6 (IPv6) address configuration is needed to meet the
needs of current portable devices and wearable applications, where each device needs its …

Optimized Duplicate Address Detection for the Prevention of Denial-of-Service Attacks in IPv6 Network

Pragya, B Kumar, G Kumar - IETE Journal of Research, 2024 - Taylor & Francis
In constrained IoT networks, Stateless Address Autoconfiguration (SLAAC) utilizes the
Duplicate Address Detection (DAD) protocol to ensure the uniqueness of IPv6 addresses …

Review of IPv6 Mitigation Techniques for Enterprise Local Area Networks

NA Assotally - 2023 International Conference on Engineering …, 2023 - ieeexplore.ieee.org
IPv6 was built to improve on existing IPv4 protocol and it is known to have multiple benefits
over IPv4. One of the biggest advantage is the large address space which would solve the …

[PDF][PDF] Improving the security of mobile IPV6 signalling using KECCAK/SHA-3

S Praptodiyono, T Firmansyah… - Journal of …, 2021 - jestec.taylors.edu.my
Most people nowadays use their mobile devices to stay connected to the internet all over the
place and all the time. In order to provide their customers with excellent service, all Internet …

[HTML][HTML] Modeling and Mutation Evolution of IPv6 IP-Level Network Topology

H Tian, Y Gao, Q Liu, X Meng, L Sun - World Journal of Engineering and …, 2022 - scirp.org
In order to understand IPv6 topology characteristics and dynamic behaviors deeply, and
guide the design of IPv6 Internet structure, an Internet IP level topology evolution model (IP …