ETRI-Knowledge Sharing Plaform



논문 검색
구분 SCI
연도 ~ 키워드


학술대회 Analysis of SEND Protocol through Implementation and Simulation
Cited 16 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
안개일, 김기영, 장종수, 전용희
International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676
07MK2300, 복합단말용 침해방지 기술개발, 김기영
Neighbor Discovery (ND) protocol has been proposed to discover neighboring hosts and routers in IPv6 wired or wireless local networks. Even though ND protocol is very useful, it has a weakness to security because it allows a malicious user to impersonate a legitimate host or a router by forging ND protocol messages. To address the security problem, IETF (Internet Engineering Task Force) has proposed SEcure Neighbor Discovery (SEND) protocol. The key functions of SEND protocol include address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism. In this paper, we analyze SEND protocol in the view point of security through several experiments. For this, we implement SEND protocol in IPv6 real system and develop a simulation environment. Based on the experimental results, we also propose a monitoring-based ND message differentiation scheme which is able to make up for security vulnerability of SEND protocol effectively. © 2007 IEEE.
KSP 제안 키워드
Attack prevention, Internet Engineering Task Force, Malicious user, ND protocol, Ownership proof, Protection mechanism, Reply attack, Secure neighbor discovery, Security vulnerabilities, Simulation Environment, View Point