Limpar
25 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Ayman Al-Ani, Mohammed Anbar, Iznan H. Hasbullah, Rosni Abdullah, Ahmed K. Al-Ani,

Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients. Two well-known issues of DHCPv6 are privacy concerns due to lack of protection ... parameters into the network undetected. This paper proposes DHCPv6 security (DHCPv6Sec) approach that is based on a hybrid cryptosystem to provide authentication for the DHCPv6 server messages and to protect the privacy of the DHCPv6 client. The DHCPv6Sec was evaluated and compared to ...

Tópico(s): Network Packet Processing and Optimization

2019 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Lishan Li, Gang Ren, Ying Liu, Jian Wu,

... world. As the widely deployed address configuration protocol, DHCPv6 is responsible for allocating globally unique IPv6 addresses ... network services. However, the initial design of the DHCPv6 protocol gave little consideration to the privacy and ... security and privacy issues, we propose a secure DHCPv6 mechanism, which adds authentication and encryption mechanisms into the original DHCPv6 protocol. Compared with other proposed security mechanisms for the DHCPv6, our method can achieve all-around protection for ...

Tópico(s): RFID technology advancements

2018 - Tsinghua University Press | Tsinghua Science & Technology

Capítulo de livro

Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, Ahmed K. Al-Ani,

... a rogue Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server attack. The DHCPv6 responsible for assigning the IPv6 address to clients ... the client with network configuration parameters. A rogue DHCPv6-server can divert client to rogue servers such ... This paper proposes an approach to secure a DHCPv6-server against rogue DHCPv6-servers with a complete analysis of security challenges that are facing DHCPv6. The proposed approach uses Edwards-curve Digital Signature Algorithm (EdDSA) to prevent a rogue DHCPv6-server attack through verifying the source and the ...

Tópico(s): Cryptographic Implementations and Security

2018 - Springer Nature | Advances in intelligent systems and computing

Artigo Acesso aberto Revisado por pares

Tomasz Mrugalski, Józef Woźniak, Krzysztof Nowicki,

... two automatic configuration modes: stateless (SLAAC) and stateful (DHCPv6). Both modes may be used in wireless networks. ... configuration process, using stateless (router advertisements) or stateful (DHCPv6) mode. When care-of address (CoA) is assigned, ... way of delivering routing information to MN, using DHCPv6. Mechanism itself and its verification techniques are discussed. ...

Tópico(s): Wireless Communication Networks Research

2011 - Springer Science+Business Media | Telecommunication Systems

Capítulo de livro

Ta‐Te Lu, Cheng Wu, Wen Lin, Hsin Pei Chen, Kuang Po Hsueh,

... with Stateful Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol automatically configures IPv6 address through the router ... is the best allocation choice. The DHCPv4 and DHCPv6 (DHCP 4o6) server used 4over6 and is considered ... and performed an effectiveness analysis comparing DHCPv4 and DHCPv6 (DHCP 4o6) servers individually with Dual Stack and ...

Tópico(s): Vehicular Ad Hoc Networks (VANETs)

2016 - Springer Nature | Smart innovation, systems and technologies

Artigo Revisado por pares

Neminath Hubballi, Nikhil Tripathi,

... which can affect address configuration protocols such as DHCPv6 and StateLess Address Autoconfiguration (SLAAC). Subsequently, we also ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2016 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Ayman Al-Ani, Mohammed Anbar, Ahmed K. Al-Ani, Iznan H. Hasbullah,

Tópico(s): Network Security and Intrusion Detection

2020 - Springer Science+Business Media | Sadhana

Capítulo de livro Acesso aberto Revisado por pares

Maciej Rostański, Taras Mushynskyy,

... is necessary to use the static addressing or DHCPv6 server for IPv6 protocol (stateful autoconfiguration). The aim ...

Tópico(s): Advanced Authentication Protocols Security

2013 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Nashrul Hakiem, Akhmad Unggul Priantoro, Mohammad Umar Siddiqi, Talib Hashim Hasan,

... area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In ...

Tópico(s): Mobile Agent-Based Network Management

2012 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto

Ziqian Xiao, Jingyou Chen, Chaobo Yang,

... on next generation of Dynamic Host Configuration Protocol (DHCPv6), expounds the principle of DHCPv6 and its message exchange process. And also point ... as the security of network. The author discusses DHCPv6 as being independent of its interaction with Neighbor ...

Tópico(s): Network Packet Processing and Optimization

2009 - Canadian Center of Science and Education | Modern Applied Science

Artigo Revisado por pares

Ling-Feng Chiang, Jiang-Whai Dai,

... to detect abnormal hosts on both DHCPv4 and DHCPv6. The difference between these two tables provides illegality ...

Tópico(s): Advanced Malware Detection Techniques

2009 - Academy Publisher | Journal of Networks

Artigo Revisado por pares

Ke Xu,

... in the IoT.Simplifications of the IPv6 and DHCPv6 protocols are introduced based on those principles.Simulations ...

Tópico(s): Mobile Agent-Based Network Management

2012 - Tsinghua University Press | Journal of Tsinghua University(Science and Technology)

Artigo Acesso aberto Revisado por pares

Sofiane Imadali, Athanasia Karanasiou, Alexandru Petrescu, Ioannis Sifniadis, Eleftheria Velidou, Véronique Vèque, Pantelis Angelidis,

... a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few ...

Tópico(s): IoT and Edge/Fog Computing

2013 - Multidisciplinary Digital Publishing Institute | Future Internet

Capítulo de livro

Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, Ahmed K. Al-Ani, Saif Al-Mashhadi,

... IPv6) uses Dynamic Host Configuration Protocol for IPv6 (DHCPv6) for assigning the IPv6 address to hosts and provides the host with network configuration parameters. The DHCPv6 protocol may use to reveal host information and ... host. Thus, the authentication and privacy of the DHCPv6 messages are a vital security component in the ... approach to provide privacy and security for the DHCPv6 message. The proposed approach utilized a hybrid cryptosystem ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2019 - Springer International Publishing | Lecture notes in networks and systems

Artigo Acesso aberto

Yu LUO, Dongmei LI, Weichao YANG,

... Configuration Protocol) based on IPV6 mechanism has increased. DHCPV6 Communication is the client/server mode. The client ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2019 - Destech Publications | DEStech Transactions on Computer Science and Engineering

Artigo Revisado por pares

Gaogang Xie,

IPv6 network based on the NEMO is one direction the network develops in the future.NEMO is the most important part of mobile IPv6.Protocol conformance testing is the main method to ensure the correctness and validity of protocol implementation.This paper analyses the characteristics of NEMO,discusses idea and method to implement NEMO protocol conformance testing,explains how to design and implement test suit using CTL.And the test results and analysis in Linux implementation are given.

Tópico(s): Power Systems and Technologies

2007 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo

Yu Luo, Dongmei Li, Weichao YANG,

Tópico(s): Advanced Sensor and Control Systems

2019 - Destech Publications | DEStech Transactions on Environment Energy and Earth Science

Artigo Revisado por pares

Jun Lou,

... of the Dynamic Host Configuration Protocol for IPv6, DHCPv6. Nowadays, the study of DHCPv6 is under process. We referred some drafts and protocols to summarize the scheme of DHCPv6, then designed and realized a practical DHCPv6 system based on the client/server architecture for ... have paid great attention to the security of DHCPv6, and made some study and efforts.

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2003 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo Acesso aberto

Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph G. Tront,

... the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 ( IPv4), DHCPv6 uses a clientserver model to manage addresses in networks, providing stateful address assignment.While DHCPv6 can be configured to assign randomly distributed addresses ... clear, attackers can geotemporally track clients by sniffing DHCPv6 messages on the local network or by using ... as its computational overhead.The privacy implications of DHCPv6 must be addressed before large-scale IPv6 deployment.

Tópico(s): Internet Traffic Analysis and Secure E-voting

2012 - | International Journal for Information Security Research

Capítulo de livro Acesso aberto Revisado por pares

Julien Bournelle, Jean‐Michel Combes, Maryline Laurent, Sondes Larafa,

... access, the current IETF approach is to use DHCPv6 to deliver the Home Agent and then to ... is directly delivered to the Mobile Node and DHCPv6 is no more necessary. Moreover, it allows a ...

Tópico(s): Advanced Authentication Protocols Security

2007 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Wu Chengyong,

... The implementation approach is discussed. As an example,DHCPv6 related algorithms are given. And the working process ...

Tópico(s): Embedded Systems and FPGA Design

2009 - East China Computer Technology Research Institute | Jisuanji gongcheng

Capítulo de livro Revisado por pares

Dongkeun Lee, Keecheon Kim,

... but the solution is lighter and faster than DHCPv6. Our scheme is flexible and efficient, as shown ...

Tópico(s): Wireless Networks and Protocols

2006 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Xue Feng Jiang, Shan Jiang, Jun Rui Liu,

... addressing, neighbor discovery process, the domain name system , DHCPv6 , ICMPv6, IPv6 routing and security series of IPv6 ...

Tópico(s): Network Packet Processing and Optimization

2012 - Trans Tech Publications | Advanced materials research

Artigo

Zhiyong Tao,

... IPv6,the stateless and stateful address autoconfiguration of DHCPv6 in Linux operating system were analyzed respectively through ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2012 - Science Press | Journal of Computer Applications

Artigo

Narender Singh, Jahid Ali,

... and to control the mobility between mobile and DHCPv6 server, signal traffic of hosts and routers, so ...

Tópico(s): Software-Defined Networks and 5G

2019 - IJARIT Research Foundation | International journal of advance research, ideas and innovations in technology