首页> 外文期刊>International journal of business data communications and networking >Secure Neighbor Discovery Protocol: Review and Recommendations
【24h】

Secure Neighbor Discovery Protocol: Review and Recommendations

机译:安全邻居发现协议:审查和建议

获取原文
获取原文并翻译 | 示例
       

摘要

The neighbor discovery protocol (NDP) is a stateless protocol facilitating link local communication in IPv6 networks. The nodes employ IPv6 NDP to locate other hosts/routers on the link, cover resolution of link layer addresses, duplicate address detections and track reachability status about paths to active nodes. However, link local communication using NDP is susceptible to some severe attacks, which if neglected leave the network vulnerable. Attackers can spoof source addresses of legitimate nodes by forging NDP messages and propel attacks like Denial of Service (DoS) and Man-in-the-Middle (MITM) leading to failure of IPv6 host initialization. To avert this, RFC 3971 advocates employing Secure Neighbor Discovery (SeND) to make the process inviolable. SeND fortifies message tampering, prevents IPv6 address theft, including protection against replay attacks and enable validation of routers on the link. Although SeND is a robust link layer security mechanism, its practical implementation is reported to have serious shortcomings like cryptographic algorithms which impact computational complexity including bandwidth utilization, as such negate their implementation and adoption. Moreover, the protocol itself fails to provide the confidentiality factor in the network. SeND also falls short of mature unabridged implementations in commercial operating systems and network devices. This paper revisits the protocol implementation and reviews its deployment challenges. This article also discusses some feasible proposals and recommendations for facilitating practical deployment of SeND in IPv6 networks including resource constrained devices like mobile phones.
机译:邻居发现协议(NDP)是一种无状态协议,可促进IPv6网络中的链路本地通信。节点使用IPv6 NDP来定位链路上的其他主机/路由器,覆盖链路层地址的分辨率,重复的地址检测并跟踪有关到活动节点的路径的可达性状态。但是,使用NDP进行的链路本地通信容易受到一些严重的攻击,如果忽略这些攻击,则会使网络容易受到攻击。攻击者可以通过伪造NDP消息来欺骗合法节点的源地址,并推进拒绝服务(DoS)和中间人(MITM)之类的攻击,从而导致IPv6主机初始化失败。为了避免这种情况,RFC 3971提倡采用安全邻居发现(SeND)来使该过程不可侵犯。 SeND加强了消息篡改,防止了IPv6地址被盗,包括防止重放攻击并启用了链路上路由器的验证。尽管SeND是一种健壮的链路层安全机制,但据报道其实际实现具有严重的缺陷,例如加密算法,会影响包括带宽利用率在内的计算复杂性,因此会否定其实现和采用。此外,协议本身无法在网络中提供机密性因素。 SeND在商业操作系统和网络设备中还缺少成熟的,未删减的实现。本文回顾了协议的实现并回顾了其部署挑战。本文还讨论了一些可行的建议和建议,以促进SeND在IPv6网络中的实际部署,包括诸如手机之类的资源受限设备。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号