Ayman Al-Ani, Mohammed Anbar, Iznan H. Hasbullah, Rosni Abdullah, Ahmed K. Al-Ani,
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients. Two well-known issues of DHCPv6 are privacy concerns due to lack of protection ... parameters into the network undetected. This paper proposes DHCPv6 security (DHCPv6Sec) approach that is based on a hybrid cryptosystem to provide authentication for the DHCPv6 server messages and to protect the privacy of the DHCPv6 client. The DHCPv6Sec was evaluated and compared to ...
Tópico(s): Network Packet Processing and Optimization
2019 - Institute of Electrical and Electronics Engineers | IEEE Access
Lishan Li, Gang Ren, Ying Liu, Jian Wu,
... world. As the widely deployed address configuration protocol, DHCPv6 is responsible for allocating globally unique IPv6 addresses ... network services. However, the initial design of the DHCPv6 protocol gave little consideration to the privacy and ... security and privacy issues, we propose a secure DHCPv6 mechanism, which adds authentication and encryption mechanisms into the original DHCPv6 protocol. Compared with other proposed security mechanisms for the DHCPv6, our method can achieve all-around protection for ...
Tópico(s): RFID technology advancements
2018 - Tsinghua University Press | Tsinghua Science & Technology
Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, Ahmed K. Al-Ani,
... a rogue Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server attack. The DHCPv6 responsible for assigning the IPv6 address to clients ... the client with network configuration parameters. A rogue DHCPv6-server can divert client to rogue servers such ... This paper proposes an approach to secure a DHCPv6-server against rogue DHCPv6-servers with a complete analysis of security challenges that are facing DHCPv6. The proposed approach uses Edwards-curve Digital Signature Algorithm (EdDSA) to prevent a rogue DHCPv6-server attack through verifying the source and the ...
Tópico(s): Cryptographic Implementations and Security
2018 - Springer Nature | Advances in intelligent systems and computing
Tomasz Mrugalski, Józef Woźniak, Krzysztof Nowicki,
... two automatic configuration modes: stateless (SLAAC) and stateful (DHCPv6). Both modes may be used in wireless networks. ... configuration process, using stateless (router advertisements) or stateful (DHCPv6) mode. When care-of address (CoA) is assigned, ... way of delivering routing information to MN, using DHCPv6. Mechanism itself and its verification techniques are discussed. ...
Tópico(s): Wireless Communication Networks Research
2011 - Springer Science+Business Media | Telecommunication Systems
Ta‐Te Lu, Cheng Wu, Wen Lin, Hsin Pei Chen, Kuang Po Hsueh,
... with Stateful Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol automatically configures IPv6 address through the router ... is the best allocation choice. The DHCPv4 and DHCPv6 (DHCP 4o6) server used 4over6 and is considered ... and performed an effectiveness analysis comparing DHCPv4 and DHCPv6 (DHCP 4o6) servers individually with Dual Stack and ...
Tópico(s): Vehicular Ad Hoc Networks (VANETs)
2016 - Springer Nature | Smart innovation, systems and technologies
Neminath Hubballi, Nikhil Tripathi,
... which can affect address configuration protocols such as DHCPv6 and StateLess Address Autoconfiguration (SLAAC). Subsequently, we also ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2016 - Elsevier BV | Computers & Security
Ayman Al-Ani, Mohammed Anbar, Ahmed K. Al-Ani, Iznan H. Hasbullah,
Tópico(s): Network Security and Intrusion Detection
2020 - Springer Science+Business Media | Sadhana
Maciej Rostański, Taras Mushynskyy,
... is necessary to use the static addressing or DHCPv6 server for IPv6 protocol (stateful autoconfiguration). The aim ...
Tópico(s): Advanced Authentication Protocols Security
2013 - Springer Science+Business Media | Lecture notes in computer science
Nashrul Hakiem, Akhmad Unggul Priantoro, Mohammad Umar Siddiqi, Talib Hashim Hasan,
... area network (WLAN) which may be incorporated into DHCPv6 (Dynamic Host Configuration Protocol for IPv6) software. In ...
Tópico(s): Mobile Agent-Based Network Management
2012 - Springer Science+Business Media | Lecture notes in electrical engineering
Ziqian Xiao, Jingyou Chen, Chaobo Yang,
... on next generation of Dynamic Host Configuration Protocol (DHCPv6), expounds the principle of DHCPv6 and its message exchange process. And also point ... as the security of network. The author discusses DHCPv6 as being independent of its interaction with Neighbor ...
Tópico(s): Network Packet Processing and Optimization
2009 - Canadian Center of Science and Education | Modern Applied Science
Ling-Feng Chiang, Jiang-Whai Dai,
... to detect abnormal hosts on both DHCPv4 and DHCPv6. The difference between these two tables provides illegality ...
Tópico(s): Advanced Malware Detection Techniques
2009 - Academy Publisher | Journal of Networks
... in the IoT.Simplifications of the IPv6 and DHCPv6 protocols are introduced based on those principles.Simulations ...
Tópico(s): Mobile Agent-Based Network Management
2012 - Tsinghua University Press | Journal of Tsinghua University(Science and Technology)
Sofiane Imadali, Athanasia Karanasiou, Alexandru Petrescu, Ioannis Sifniadis, Eleftheria Velidou, Véronique Vèque, Pantelis Angelidis,
... a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few ...
Tópico(s): IoT and Edge/Fog Computing
2013 - Multidisciplinary Digital Publishing Institute | Future Internet
Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, Ahmed K. Al-Ani, Saif Al-Mashhadi,
... IPv6) uses Dynamic Host Configuration Protocol for IPv6 (DHCPv6) for assigning the IPv6 address to hosts and provides the host with network configuration parameters. The DHCPv6 protocol may use to reveal host information and ... host. Thus, the authentication and privacy of the DHCPv6 messages are a vital security component in the ... approach to provide privacy and security for the DHCPv6 message. The proposed approach utilized a hybrid cryptosystem ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2019 - Springer International Publishing | Lecture notes in networks and systems
Yu LUO, Dongmei LI, Weichao YANG,
... Configuration Protocol) based on IPV6 mechanism has increased. DHCPV6 Communication is the client/server mode. The client ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2019 - Destech Publications | DEStech Transactions on Computer Science and Engineering
IPv6 network based on the NEMO is one direction the network develops in the future.NEMO is the most important part of mobile IPv6.Protocol conformance testing is the main method to ensure the correctness and validity of protocol implementation.This paper analyses the characteristics of NEMO,discusses idea and method to implement NEMO protocol conformance testing,explains how to design and implement test suit using CTL.And the test results and analysis in Linux implementation are given.
Tópico(s): Power Systems and Technologies
2007 - East China Computer Technology Research Institute | Jisuanji gongcheng
Yu Luo, Dongmei Li, Weichao YANG,
Tópico(s): Advanced Sensor and Control Systems
2019 - Destech Publications | DEStech Transactions on Environment Energy and Earth Science
... of the Dynamic Host Configuration Protocol for IPv6, DHCPv6. Nowadays, the study of DHCPv6 is under process. We referred some drafts and protocols to summarize the scheme of DHCPv6, then designed and realized a practical DHCPv6 system based on the client/server architecture for ... have paid great attention to the security of DHCPv6, and made some study and efforts.
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2003 - East China Computer Technology Research Institute | Jisuanji gongcheng
Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph G. Tront,
... the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for the Internet Protocol version 4 ( IPv4), DHCPv6 uses a clientserver model to manage addresses in networks, providing stateful address assignment.While DHCPv6 can be configured to assign randomly distributed addresses ... clear, attackers can geotemporally track clients by sniffing DHCPv6 messages on the local network or by using ... as its computational overhead.The privacy implications of DHCPv6 must be addressed before large-scale IPv6 deployment.
Tópico(s): Internet Traffic Analysis and Secure E-voting
2012 - | International Journal for Information Security Research
Julien Bournelle, Jean‐Michel Combes, Maryline Laurent, Sondes Larafa,
... access, the current IETF approach is to use DHCPv6 to deliver the Home Agent and then to ... is directly delivered to the Mobile Node and DHCPv6 is no more necessary. Moreover, it allows a ...
Tópico(s): Advanced Authentication Protocols Security
2007 - Springer Science+Business Media | Lecture notes in computer science
... The implementation approach is discussed. As an example,DHCPv6 related algorithms are given. And the working process ...
Tópico(s): Embedded Systems and FPGA Design
2009 - East China Computer Technology Research Institute | Jisuanji gongcheng
... but the solution is lighter and faster than DHCPv6. Our scheme is flexible and efficient, as shown ...
Tópico(s): Wireless Networks and Protocols
2006 - Springer Science+Business Media | Lecture notes in computer science
Xue Feng Jiang, Shan Jiang, Jun Rui Liu,
... addressing, neighbor discovery process, the domain name system , DHCPv6 , ICMPv6, IPv6 routing and security series of IPv6 ...
Tópico(s): Network Packet Processing and Optimization
2012 - Trans Tech Publications | Advanced materials research
... IPv6,the stateless and stateful address autoconfiguration of DHCPv6 in Linux operating system were analyzed respectively through ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2012 - Science Press | Journal of Computer Applications
... and to control the mobility between mobile and DHCPv6 server, signal traffic of hosts and routers, so ...
Tópico(s): Software-Defined Networks and 5G
2019 - IJARIT Research Foundation | International journal of advance research, ideas and innovations in technology