Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5838657, 9 pages
https://doi.org/10.1155/2017/5838657
Research Article

An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

South China University of Technology, Guangzhou, China

Correspondence should be addressed to Meng Wang; nc.ude.tucs.liam@51m.w

Received 18 September 2016; Revised 27 November 2016; Accepted 13 December 2016; Published 24 January 2017

Academic Editor: Jesús Díaz-Verdejo

Copyright © 2017 Yiqin Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Deering and R. Hinden, Internet Protocol Version 6 (IPv6) Specification, Internet rfc 2460 edn, 1998.
  2. T. Narten, E. Nordmark, W. Simpson, and H. Soliman, “Neighbor Discovery for IP version 6 (IPv6),” Internet rfc 2461 edn. 2007.
  3. S. Thomson, T. Narten, and T. Jinmei, “IPv6 stateless address autoconfiguration,” Internet rfc 4862, 2007. View at Google Scholar
  4. Open Networking Foundation(ONF), Software-Defined Networking: The New Norm for Networks, 2012.
  5. M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: state of the art and research challenges,” Computer Networks, vol. 72, pp. 74–98, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, “A survey of securing networks using software defined networking,” IEEE Transactions on Reliability, vol. 64, no. 3, pp. 1086–1097, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. N. McKeown, T. Anderson, H. Balakrishnan et al., “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. View at Publisher · View at Google Scholar
  8. Open Networking Foundation(ONF), OpenFlow Switch Specification Version 1.3.0, 2012.
  9. F. Xiaorong, L. Jun, and J. Shizhun, “Security analysis for IPv6 neighbor discovery protocol,” in Proceedings of the 2nd International Symposium on Instrumentation and Measurement (IMSNA '13), pp. 303–307, Toronto, Canada, December 2013.
  10. A. AlSa'deh and C. Meinel, “Secure neighbor discovery: review, challenges, perspectives, and recommendations,” IEEE Security and Privacy, vol. 10, no. 4, pp. 26–34, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. C. E. Caicedo, J. B. D. Joshi, and S. R. Tuladhar, “IPv6 security challenges,” Computer, vol. 42, no. 2, pp. 36–42, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. A. S. Ahmed, R. Hassan, and N. E. Othman, “Improving security for IPv6 neighbor discovery,” in Proceedings of the International Conference on Electrical Engineering and Informatics (ICEEI '15), pp. 271–274, IEEE, Denpasar, Indonesia, August 2015. View at Publisher · View at Google Scholar
  13. J. Arkko, J. Kempf, B. Zill, and P. Nikander, “Secure Neighbor Discover (SEND),” Internet rfc 3971 edn. 2005.
  14. F. A. Barbhuiya, S. Biswas, and S. Nandi, “Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol,” in Proceedings of the 4th International Conference on Security of Information and Networks (SIN '11), pp. 111–118, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. S. U. Rehman and S. Manickam, “Rule-based mechanism to detect Denial of Service (DoS) attacks on Duplicate Address Detection process in IPv6 link local communication,” in Proceedings of the 4th ICRITO (Trends and Future Directions), pp. 1–6, 2015.
  16. G. Yao, J. Bi, S. Wang, Y. Zhang, and Y. Li, “A pull model IPv6 duplicate address detection,” in Proceedings of the 35th Annual IEEE Conference on Local Computer Networks (LCN '10), pp. 372–375, Denver, Colo, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. P. Nikander, J. Kempf, and E. Nordmark, “IPv6 Neighbor Discovery (ND) Trust Models and Threats,” Internet rfc 3756 edn. 2004.
  18. floodlight, http://www.projectfloodlight.org/.
  19. OpenvSwitch, http://openvswitch.org/.
  20. Virtualbox, https://www.virtualbox.org/.
  21. THC-IPv6, https://www.thc.org/thc-ipv6/.