ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Analysis of SEND Protocol through Implementation and Simulation
Cited 16 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
Authors
Gae Il An, Ki Young Kim, Jong Soo Jang, Yong Hee Jeon
Issue Date
2007-11
Citation
International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICCIT.2007.4420336
Project Code
07MK2300, Development of the threat containment for all-in-one mobile devices on convergence networks, Kim Ki Young
Abstract
Neighbor Discovery (ND) protocol has been proposed to discover neighboring hosts and routers in IPv6 wired or wireless local networks. Even though ND protocol is very useful, it has a weakness to security because it allows a malicious user to impersonate a legitimate host or a router by forging ND protocol messages. To address the security problem, IETF (Internet Engineering Task Force) has proposed SEcure Neighbor Discovery (SEND) protocol. The key functions of SEND protocol include address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism. In this paper, we analyze SEND protocol in the view point of security through several experiments. For this, we implement SEND protocol in IPv6 real system and develop a simulation environment. Based on the experimental results, we also propose a monitoring-based ND message differentiation scheme which is able to make up for security vulnerability of SEND protocol effectively. © 2007 IEEE.
KSP Keywords
Attack prevention, Internet Engineering Task Force, Malicious user, ND protocol, Ownership proof, Protection mechanism, Reply attack, Secure neighbor discovery, Security vulnerabilities, Simulation Environment, View Point