Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
Home
>
Published Issues
>
2018
>
Volume 13, No. 6, June 2018
>
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network
Ahmed K. Al-Ani, Mohammed Anbar, Selvakumar Manickam, and Ayman Al-Ani
National Advanced IPv6 Centre, USM, 11800 Gelugor, Penang, Malaysia
Abstract—
Duplicate Address Detection (DAD) is one of the core procedures in Internet Protocol version 6 (IPv6). It allows all the nodes locate on the same link to communicate and join the network with a unique IP address. However, DAD is vulnerable to security threats. The DAD procedure is based on two Neighbour Discovery (ND) messages, namely, Neighbour Solicitation (NS) and Neighbour Advertisement (NA), to verify that the tentative IP is multicast to all existing hosts through an NS message. Thus, DAD allows any malicious node on the same link to receive the NS message, and the malicious node may send a spoof reply to prevent the address configuration of a target node, thereby resulting in a Denial of Service (DoS) attack. This study aims to secure the DAD procedure by hiding the tentative IP address during the process, thereby preventing a malicious node from disturbing the target node IP configuration process. The proposed security DAD-match technique builds on SHA-3 hash function by proposing a new option called DADmatch, which holds the hash value of tentative IP address and attaches to NS and NA messages to become NS-match and NA-match messages. We expect the DAD-match technique can provide less complex lightweight security and will fully prevent DoS attacks during the DAD procedure in IPv6 link-local network.
Index Terms
—Duplicate Address Detection, DAD, DoS attack, IPv6 Security, hash function, DAD-match technique
Cite: Ahmed K. Al-Ani, Mohammed Anbar, Selvakumar Manickam, and Ayman Al-Ani, " DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network, vol. 13, no. 6, pp. 317-324 2018. Doi: 10.12720/jcm.13.6.317-324.
7-JCM170056
PREVIOUS PAPER
Two Novel Multiband Centimetre-Wave Patch Antennas for a Novel OFDM Based RFID System
NEXT PAPER
Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks