Amjed Sid Ahmed
IPv6 cryptographically generated address: Analysis, optimization and protection
Ahmed, Amjed Sid; Hassan, Rosilah; Qamar, Faizan; Malik, Mazhar
Authors
Rosilah Hassan
Faizan Qamar
Dr Mazhar Malik Mazhar.Malik@uwe.ac.uk
Associate Director Intelligent Systems
Abstract
In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers. To resolve this issue, the use of selfcertifying addresses have become a highly popular and standardized method, of which Cryptographically Generated Addresses (CGA) is a prime example. CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership. Even though the CGA technique is highly effective, this method is still subject to several vulnerabilities with respect to security, in addition to certain limitations in its performance. In this study, the authors present an intensive systematic review of the literature to explore the technical specifications of CGA, its challenges, and existing proposals to enhance the protocol. Given that CGA generation is a time-consuming process, this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage. FulfillingHash2 conditions inCGAis the heaviest andmost timeconsuming part of SEND. To improve the performance of CGA, we replaced the Secure Hash Algorithm (SHA1) with the Message Digest (MD5) hash function. Furthermore, this study also analyzes the possible methods through which aCGAcould be attacked. In conducting this analysis,Denial-of-Service (DoS) attacks were identified as the main method of attack toward the CGA verification process, which compromise and threaten the privacy of CGA. Therefore, we propose some modifications to the CGA standard verification algorithm to mitigateDoS attacks and to make CGAmore security conscious.
Journal Article Type | Article |
---|---|
Acceptance Date | Nov 24, 2020 |
Online Publication Date | Mar 22, 2021 |
Publication Date | Mar 22, 2021 |
Deposit Date | Nov 10, 2022 |
Journal | Computers, Materials and Continua |
Print ISSN | 1546-2218 |
Electronic ISSN | 1546-2226 |
Publisher | Tech Science Press |
Peer Reviewed | Peer Reviewed |
Volume | 68 |
Issue | 1 |
Pages | 247-265 |
DOI | https://doi.org/10.32604/cmc.2021.014233 |
Keywords | IPv6; GCA; SEND; DoS attacks; RSA; SHA-1 |
Public URL | https://uwe-repository.worktribe.com/output/10130484 |
Publisher URL | https://www.techscience.com/cmc/v68n1/41797 |
You might also like
Max-gain relay selection scheme for wireless networks
(2020)
Journal Article
COVID-19 and learning styles: GCET as case study
(2021)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search