All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

DOI: 10.4236/oalib.1104424, PP. 1-12

Subject Areas: Information and Communication: Security, Privacy, and Trust, Computer and Network Security, Network Modeling and Simulation, Communication Protocols

Keywords: IPv6, SLACC, Security, Homenet, Election, Autoconfiguration, RA

Full-Text   Cite this paper   Add to My Lib

Abstract

In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the relay of auto configuration messages coming from various routers of internet access providers. Our method allows the routers of the Home Network domain to filter the announcements of autoconfigurations called RA (Router Advertisements) according to the IPv6 addresses sources contained in the messages of autoconfiguration. The decision to relay or reject these announcements is based on a trusted table built from the addressing information obtained from the NDP protocol. Our method also aims to optimize the traffic in the Home Network domain by organizing routers to give them specific roles for the relay of information for autoconfiguration.

Cite this paper

Massamba, S. Y. and Cheikh, S. A. R. R. (2018). Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks. Open Access Library Journal, 5, e4424. doi: http://dx.doi.org/10.4236/oalib.1104424.

References

[1]  Deering, S. and Hinden, R. (1995) Internet Protocol, Version 6 (IPv6) Specification. RFC1883, Xerox PARC, Ipsilon Networks.
https://doi.org/10.17487/rfc1883
[2]  Thomson, S., Narten, T. and Jinmei, T. (2007) IPv6 Stateless Address Autoconfiguration. IETF RFC 4862, Cisco, IBM, Toshiba.
[3]  Park, M., Kim, J.-T., Paik, E.H. and Park, K.-R. (2007) Deployment Strategy and Performance Evaluation of the IPv6 Home Network Using the Home Server. IEEE Transactions on Consumer Electronics, 53.
https://doi.org/10.1109/ICCE.2007.341546
[4]  Kaiser, A. and Boc, M. (2014) Energy-Efficient Routing in IPv6 Home Networks. CEA, LIST, Laboratoire des Systemes Communicants, 2014 23rd International Conference on Computer Communication and Networks (ICCCN), 4-7 August 2014, Shanghai.
https://doi.org/10.1109/ICCCN.2014.6911769
[5]  Elejla, O.E., Belaton, B. and Anba, M. (2017) A New Set of Features for Detecting Router Advertisement Flooding Attacks. 2017 Palestinian International Conference on Information and Communication Technology, 1-5.
https://doi.org/10.1109/PICICT.2017.19
[6]  Nordmark, E. and Bagnulo, M. (2009) Shim6: Level 3 Multihoming Shim Protocol for IPv6. Sun Microsystems, UC3M.
[7]  Narten, T., Nordmark, E. and Simpson W. (1998) Neighbor Discovery for IP Version 6. IETF RFC 2461, IBM, Sun Microsystems, Daydreamer.
[8]  Conta, A., Deering, S. and Gupta, M. (Eds.) (2006) Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. IETF RFC 4443, Transwitch, Cisco Systems, Tropos Networks.
[9]  Chown Ed, T., Arkko, J., Brandt, A., Troan, O. and Weil, J. (2014) IPv6 Home Networking Architecture Principles. IETF RFC 7368, University of Southampton, Ericsson, Sigma Designs, Cisco Systems, Inc., Time Warner Cable.
[10]  Kumar, A. and Mani, R.S. (2013) First Hop Security Considerations in IPV6 Implementation. National Knowledge Network, National Informatics Centre, New Delhi, India.
[11]  Yao, G. and Bi, J. (2008) A CGA Based IP Source Address Authentication Method in IPv6 Access Network. IEEE Local Computer Networks (IEEE LCN), 534–535.
https://doi.org/10.1109/LCN.2008.4664225

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

微信:OALib Journal