The study on secure auto-configuration technology in IPv6

被引:1
|
作者
Kim, ME [1 ]
Seo, DI [1 ]
机构
[1] ETRI, Network Secur Architecture Res Team, Taejon, South Korea
关键词
IPv6; auto-configuration; security vulnerability; neighbor discovery protocol;
D O I
10.1109/ICACT.2005.246012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Present IPv4 address exhaustion problem is solving through NAT (Network Address Translation) and the transition to next Generation Internet is accelerated because of advantage that can offer various function of mobility security service, QoS as well as solution of IPv4's address exhaustion. In IPv6 all hosts are designed to create and sets their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when IPv6 host sets its address automatically, there are serious security vulnerabilities. To solve this security problem, many people have researched about secure auto-configuration. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 50 条
  • [41] IPv4 auto-configuration of multi-router Zeroconf networks with unique subnets
    Akinlar, C
    Shankar, AU
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 156 - 163
  • [42] An Adaptive Auto-Configuration Tool for Hadoop
    Li, Changlong
    Zhuang, Hang
    Lu, Kun
    Sun, Mingming
    Zhou, Jinhong
    Dai, Dong
    Zhou, Xuehai
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 69 - 72
  • [43] Auto-configuration by file construction: Configuration management with newfig
    LeFebvre, W
    Snyder, D
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTEENTH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE, 2004, : 93 - 104
  • [44] DNS Update Extension to IPv6 Secure Addressing
    Rafiee, Hosnieh
    von Loewis, Martin
    Meinel, Christoph
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 896 - 902
  • [45] A secure network access system for mobile IPv6
    Zhang, H
    Yuan, M
    He, R
    Jiang, LL
    Ma, J
    Qian, HL
    [J]. APOC 2003: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; MOBILE SERVICE AND APPLICATION, 2003, 5283 : 14 - 20
  • [46] A grouping scheme for secure multicasting in mobile IPv6
    Al-Talib, S
    Ali, BM
    Prakash, V
    Habaebi, MH
    [J]. 4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 106 - 109
  • [47] Secure authentication protocol in mobile IPv6 networks
    Koo, Jung Doo
    Koo, Jung Sook
    Lee, Dong Chun
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2006, 4253 : 548 - 555
  • [48] Implementing a secure AAA system in IPv6 network
    Meng, Fang
    An, Changqing
    Yang, Jiahai
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 172 - +
  • [49] For a secure mobile IP and mobile IPV6 deployment
    Laurent-Maknavicius, M
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 109 - 120
  • [50] A Secure Route Optimization Protocol in Mobile IPV6
    Kavitha, D.
    Murthy, K. E. Sreenivasa
    ul Huq, S. Zahoor
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 27 - 34