An authentication based source address spoofing prevention method deployed in IPv6 edge network

被引:0
|
作者
Xie, Lizhong [1 ]
Bi, Jun [1 ]
Wu, Jianpin [1 ]
机构
[1] Tsinghua Univ, Network Res Ctr, Beijing 100084, Peoples R China
关键词
source address spoofing; IM; edge network;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In today's Internet routing architecture, the router doesn't validate the correctness of the source address carried in the packet, nor keep the state information when forwarding the packet. Thus the DDoS attacks with spoofed IP source address can cause security problems. In this paper, we aim to prevent the attackers from attacking somewhere outside the IPv6 edge network with forged source address in the fine granularity. The proposed methods include source address authentication by using session key and hash digest algorithm, and replay attack prevention by combining the sequence number method and the timestamp method. This paper presents the algorithm design and evaluates its feasibility and correctness by simulation experiments.
引用
收藏
页码:801 / +
页数:2
相关论文
共 50 条
  • [21] Cross-domain authentication protocol based on certificate signcryption in Ipv6 Network
    Zhang, Longjun
    Xia, Ang
    International Journal of Advancements in Computing Technology, 2012, 4 (21) : 34 - 41
  • [22] An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network
    Gao, Tianhan
    Tan, Ling
    Qiao, Peiyu
    Yim, Kangbin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 389 - 396
  • [23] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [24] An authentication method for proxy mobile IPv6 and performance analysis
    Zhou, Huachun
    Zhang, Hongke
    Qin, Yajuan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) : 445 - 454
  • [25] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [26] The design and implementation of an IPv6/IPv4 network address and protocol translator
    Fiuczynski, ME
    Lam, VK
    Bershad, BN
    PROCEEDINGS OF THE USENIX 1998 ANNUAL TECHNICAL CONFERENCE, 1998, : 201 - 211
  • [27] Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network
    Liu Ying
    Ren Gang
    Wu JianPing
    Zhang ShengLin
    He Lin
    Jia YiHao
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (12) : 1 - 14
  • [28] Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network
    LIU Ying
    REN Gang
    WU JianPing
    ZHANG ShengLin
    HE Lin
    JIA YiHao
    ScienceChina(InformationSciences), 2015, 58 (12) : 14 - 27
  • [29] Denial of service, address ownership, and early authentication in the IPv6 world - (Transcript of discussion)
    Nikander, P
    SECURITY PROTOCOLS, 2002, 2467 : 22 - 26
  • [30] IPv6 on everything: The new internet - IPv6 helps network architects address the IP address shortage, security, QoS, multicast and management.
    Ladid, L
    SECOND INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2001, : 317 - 322