DSpace Repository

Securing neighbor discovery of IPV6 by using preshared key

Show simple item record

dc.contributor.advisor Mustafa, Dr. Hossen Asiful
dc.contributor.author Rezaur Rahman
dc.date.accessioned 2021-08-17T10:18:29Z
dc.date.available 2021-08-17T10:18:29Z
dc.date.issued 2021-02-13
dc.identifier.uri http://lib.buet.ac.bd:8080/xmlui/handle/123456789/5760
dc.description.abstract Internet Protocol (IP) is a mechanism which has been widely deployed irrespective of back end device. In recent times, due to the proliferation of Internet of Things (IoT), the usage of IP address utilization has expanded drastically. Moreover, more and more mobile devices which are being used today are IP based. In previous times, Internet Protocol Version 4 (IPv4) laid out the foundation on how a common communication protocol should behave and how it can connect a large number of people. Unfortunately, the number of hosts that can connect in IPv4 is low compared with today's requirement. Thus combining the learning from IPv4, IPv6 was designed where a large number of address space was considered. Even though the address space appears to be limitless; some basic security related issues are unaddressed in the IPv6 as well. Most notably, how the MAC to IP address is looked up. The process was not upgraded so that users can get some bene t from security perspective but rather it was almost an in place replacement for Address Resolution Protocol (ARP) implementation which is found in IPv4. In IPv6, Neighbor Discovery Protocol (NDP) is used to discover the link-layer address of the connected hosts. In IPv4, a broadcast or a specially crafted packet is su cient to alter the IP address and MAC address table and poison the content of the victim. Similar concept is still in place where forged NA packet can have similar e ect and perform malicious activities. This is a serious security loophole as any unencrypted tra c can easily be sni ed by the attacker. To further exacerbate the security issue, in many cases, the user is unaware that a attack is in progress and under normal operation, it can be almost impossible for the user to detect. This paper presents a possible solution to this problem and compares other available solutions. In order to prevent this long outstanding issue, we have proposed a simple solution in IPv6 environment which is done by sharing a secret key between each pair of hosts in a broadcast domain so that any incoming Override packet is not processed without a challenge. This key is transferred between two hosts when they rst try to communicate between themselves. After transferring the key, both of them will retain this key so that if any request for upgrading the MAC address arrives, the key can be used to verify the authenticity of the request. Additional broadcasts are used, in case one of the host forgets the key, to ensure that attacker cannot impersonate as a valid node. Simulation in NS3 platform shows that the proposed scheme can e ectively solve this issue. en_US
dc.language.iso en en_US
dc.publisher Institute of Information and Communication Technology (IICT), BUET en_US
dc.subject Computer networking-Protocols en_US
dc.title Securing neighbor discovery of IPV6 by using preshared key en_US
dc.type Thesis-MSc en_US
dc.contributor.id 0416312019 en_US
dc.identifier.accessionNumber 117755
dc.contributor.callno 004.62/REZ/2021 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BUET IR


Advanced Search

Browse

My Account