Abubakar Ibrahim, Adamu and Abdulghafor, Rawad Abdulkhaleq Abdulmolla and Wani, Sharyar (2022) A new concept of duplicate address detection processes in IPv6 link-local network. International Journal of Innovative Computing, 12 (2). pp. 9-16. E-ISSN 2180-4370
PDF (Article)
- Published Version
Restricted to Registered users only Download (399kB) | Request a copy |
Abstract
The Neighbor Discovery Protocol (NDP) enables nodes on the same IPv6 link toadvertise their existence to their neighborsand learn about their neighbors’existences in an IPv6 link-local network. Duplicate Address Detection (DAD) on NDP is used to determine whether or not an address requested by a node is already in use byanother node. The Neighbor Solicitation (NS) and Neighbor Advertisement (NA) operations are associated to DADchecks in order to ensure that each interface within the transmission sessionis unique. Unfortunately, NS and NA operations have a significant disadvantage in that they are based on insecure architectures and lack verificationprocedures for determining whether incoming messages originate from a valid or illegitimate node. This will eventually allow any node in the same link to be manipulated during NS and NA message transmission sessions. Despite some attempts to secure the entire NDP operations, they still suffer from computing resources requirement for theiroperations. As aresult, this study proposes an Initial Neighbor Inspection (INI) on DADoperation. The proposed techniques allow for an initial round of verification of the nodes on the same link before a broadcast request on the existence of neighbors, which is followedby another round of learning about neighbors’ existences.Conclusively,using this idea, as a simple verification will indicate the presence of neighbors, we may restrict solicitation and advertising to only those who are eligible. This means that the computational processing time for NS and NA on DAD operations would not rise
Item Type: | Article (Journal) |
---|---|
Uncontrolled Keywords: | Neighbor discovery protocol, neighbor solicitation, neighbor advertisement, IPv6 |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology |
Depositing User: | Dr Adamu Abubakar |
Date Deposited: | 23 Nov 2022 09:51 |
Last Modified: | 23 Nov 2022 09:53 |
URI: | http://irep.iium.edu.my/id/eprint/101413 |
Actions (login required)
View Item |