咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >IPv6 Cryptographically Generat... 收藏

IPv6 Cryptographically Generated Address:Analysis,Optimization and Protection

作     者:Amjed Sid Ahmed Rosilah Hassan Faizan Qamar Mazhar Malik 

作者机构:Department of Computing and Information TechnologyGlobal College of Engineering and TechnologyRuwi112Sultanate of Oman Faculty of Information Science and TechnologyCenter for Cyber SecurityUniversiti Kebangsaan MalaysiaBangi43600Malaysia Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600BangiMalaysia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2021年第68卷第7期

页      面:247-265页

核心收录:

学科分类:0831[工学-生物医学工程(可授工学、理学、医学学位)] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0805[工学-材料科学与工程(可授工学、理学学位)] 0701[理学-数学] 0801[工学-力学(可授工学、理学学位)] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:supported by Dana Impak Perdana fund no.UKM DIP-2018-040 and Fundamental Research Grant Scheme fund no FRGS/1/2018/TK04/UKM/02/7 under Author R.Hassan 

主  题:IPv6 GCA SEND DoS attacks RSA SHA-1 

摘      要:In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized *** resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime *** was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address *** though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its *** this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the *** that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and *** Hash2 conditions in CGA is the heaviest and most timeconsuming part of *** improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash ***,this study also analyzes the possible methods through which a CGA could be *** conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of ***,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分