A blockchain-based protocol for tracking user access to shared medical imaging
Modern healthcare systems are complex and regularly share sensitive data among multiple
stakeholders, such as doctors, patients, and pharmacists. Patients' data has increased and …
stakeholders, such as doctors, patients, and pharmacists. Patients' data has increased and …
[PDF][PDF] Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network
MA Al-Shareeda, S Manickam… - Indones. J. Electr …, 2023 - pdfs.semanticscholar.org
The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host
and router. Fake router advertisement (RA) attacks have been made possible by this RD …
and router. Fake router advertisement (RA) attacks have been made possible by this RD …
Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
DADCNF: Diagnoser design for duplicate address detection threat using conjunctive Normal form
Abstract Duplicate Address Detection is the protocol that confirms the uniqueness of an IPv6
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Ndpsec: neighbor discovery protocol security mechanism
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …
connectivity and information technology (IT) expansion. Due to its enormous address pool …
IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone
The fusion of drones with the Internet, termed the Internet of Drones (IoD), resembles the
Internet of Things (IoT) paradigm. In IoD, drones necessitate unique identifiers similar to IPv6 …
Internet of Things (IoT) paradigm. In IoD, drones necessitate unique identifiers similar to IPv6 …
IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks
With technology development, the growing self-communicating devices in IoT networks
require specific naming and identification, mainly provided by IPv6 addresses. The IPv6 …
require specific naming and identification, mainly provided by IPv6 addresses. The IPv6 …
Review paper on neighbour discovery protocol in IPv6 link-local network
Internet Protocol version 6 (IPv6) signifies the latest version of IP, the 'Internet Protocol'. The
communication protocol allocates an identification, as well as a location system of …
communication protocol allocates an identification, as well as a location system of …
Brief of intrusion detection systems in detecting ICMPv6 attacks
AH Bdair, R Abdullah, S Manickam… - … Science and Technology …, 2020 - Springer
Network security, amongst other security issues, essentially requires implementing Internet
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …