To see the other types of publications on this topic, follow the link: IPv6 Neighbor Discovery.

Journal articles on the topic 'IPv6 Neighbor Discovery'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 journal articles for your research on the topic 'IPv6 Neighbor Discovery.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shah, Junaid Latief. "Secure Neighbor Discovery Protocol." International Journal of Business Data Communications and Networking 15, no. 1 (2019): 71–87. http://dx.doi.org/10.4018/ijbdcn.2019010105.

Full text
Abstract:
The neighbor discovery protocol (NDP) is a stateless protocol facilitating link local communication in IPv6 networks. The nodes employ IPv6 NDP to locate other hosts/routers on the link, cover resolution of link layer addresses, duplicate address detections and track reachability status about paths to active nodes. However, link local communication using NDP is susceptible to some severe attacks, which if neglected leave the network vulnerable. Attackers can spoof source addresses of legitimate nodes by forging NDP messages and propel attacks like Denial of Service (DoS) and Man-in-the-Middle
APA, Harvard, Vancouver, ISO, and other styles
2

Luo, Bingqing, Zhixin Sun, Yu Pang, et al. "Neighbor Discovery for IPv6 over BLE Mesh Networks." Applied Sciences 10, no. 5 (2020): 1844. http://dx.doi.org/10.3390/app10051844.

Full text
Abstract:
IPv6 over Bluetooth Low Energy (6LoBLE) can realize the seamless connection between Bluetooth Low Energy (BLE) devices and the Internet, solve the restrictions on Bluetooth applications as short distance communication solutions, and advance the development of applications of smart cities, such as smart buildings and smart city management. Since neighbor discovery is the first step for BLE devices to establish a connection with each other, this paper proposes a novel neighbor discovery protocol for IPv6 over BLE mesh networks, including the structure of IPv6 over BLE mesh networks, the networki
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Xue Feng, Shan Jiang, and Jun Rui Liu. "Packet Capturing and Filtering on the IPv6 Based Networking Environment." Advanced Materials Research 630 (December 2012): 265–70. http://dx.doi.org/10.4028/www.scientific.net/amr.630.265.

Full text
Abstract:
Nowadays, IPv4 addresses have been exhausted. IPv6 as the next generation of the Internet Protocol is gradually moving towards practical , Network monitoring is very important to the practical use of IPv6 , The security problems of IPv6 study is not mature, especially the security of IPv6 network security products are less . This study uses the existing IPv4 network security research results, aiming at the characteristic of IPv6 protocol , Analysis of the structure and classification of the IPv6 address , IPv6 addressing, neighbor discovery process, the domain name system , DHCPv6 , ICMPv6, IP
APA, Harvard, Vancouver, ISO, and other styles
4

YE, Xin-Ming. "Formal Verification of IPv6 Neighbor Discovery Protocol." Journal of Software 16, no. 6 (2005): 1182. http://dx.doi.org/10.1360/jos161182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Narten, T. "Neighbor discovery and stateless autoconfiguration in IPv6." IEEE Internet Computing 3, no. 4 (1999): 54–62. http://dx.doi.org/10.1109/4236.780961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rahman, Rezaur, and Hossen Asiful Mustafa. "Securing IPv6 Neighbor Discovery using Pre-Shared Key." Advances in Science, Technology and Engineering Systems Journal 6, no. 2 (2021): 722–32. http://dx.doi.org/10.25046/aj060284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hassan, Rosilah, Amjed Sid Ahmed, and Nur Effendy Osman. "ENHANCING SECURITY FOR IPV6 NEIGHBOR DISCOVERY PROTOCOL USING CRYPTOGRAPHY." American Journal of Applied Sciences 11, no. 9 (2014): 1472–79. http://dx.doi.org/10.3844/ajassp.2014.1472.1479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abubakar Ibrahim, Adamu, Rawad Abdulkhaleq Abdulmolla Abdulghafor, and Sharyar Wani. "A New Concept of Duplicate Address Detection Processes in IPv6 Link-Local Network." International Journal of Innovative Computing 12, no. 2 (2022): 9–16. http://dx.doi.org/10.11113/ijic.v12n2.368.

Full text
Abstract:
The Neighbor Discovery Protocol (NDP) enables nodes on the same IPv6 link to advertise their existence to their neighbors and learn about their neighbors’ existences in an IPv6 link-local network. Duplicate Address Detection (DAD) on NDP is used to determine whether or not an address requested by a node is already in use by another node. The Neighbor Solicitation (NS) and Neighbor Advertisement (NA) operations are associated to DAD checks in order to ensure that each interface within the transmission session is unique. Unfortunately, NS and NA operations have a significant disadvantage in that
APA, Harvard, Vancouver, ISO, and other styles
9

Ahmed, Amjed Sid, Rosilah Hassan, Nor Effendy Othman, Nor Idayu Ahmad, and Yassir Kenish. "Impacts Evaluation of DoS Attacks Over IPv6 Neighbor Discovery Protocol." Journal of Computer Science 15, no. 5 (2019): 702–27. http://dx.doi.org/10.3844/jcssp.2019.702.727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, J. H. "Cross-layered IPv6 neighbor discovery scheme over WLAN mesh networks." IEEE Communications Letters 13, no. 12 (2009): 992–94. http://dx.doi.org/10.1109/lcomm.2009.12.091214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Barbhuiya, Ferdous A., Gunjan Bansal, Niteesh Kumar, Santosh Biswas, and Sukumar Nandi. "Detection of neighbor discovery protocol based attacks in IPv6 network." Networking Science 2, no. 3-4 (2013): 91–113. http://dx.doi.org/10.1007/s13119-013-0018-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mohamed Sid Ahmed, Amjed Sid Ahmed, Rosilah Hassan, and Nor Effendy Othman. "IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey." IEEE Access 5 (2017): 18187–210. http://dx.doi.org/10.1109/access.2017.2737524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lu, Yiqin, Meng Wang, and Pengsen Huang. "An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5838657.

Full text
Abstract:
The Neighbor Discovery Protocol (NDP) is one of the main protocols in the Internet Protocol version 6 (IPv6) suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN), such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or
APA, Harvard, Vancouver, ISO, and other styles
14

LEE, Jihoon, Seungwoo JEON, and Jaehoon KIM. "Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks." IEICE Transactions on Communications E93-B, no. 5 (2010): 1151–54. http://dx.doi.org/10.1587/transcom.e93.b.1151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sethuraman, Maanasaa, and Senthilkumar Mathi. "Preventing Denial-of-service in Next Generation Internet Protocol Mobility." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 1 (2018): 137. http://dx.doi.org/10.11591/ijeecs.v12.i1.pp137-146.

Full text
Abstract:
Internet Protocol version 6 (IPv6) is a next-generation internet protocol that is devised to replace its predecessor, the IPv4. With the benefit of ample address space, flexible header extensions and its many specific features, IPv6 is the future of the Internet and Internetworking. A significant advantage of IPv6 is its capabilities in the domain of security and mobility, where it scores in comparison with its predecessor. One of the many features specific to IPv6, such as the mandatory IPsec messaging or address auto-configuration, is the Neighbor Discovery Protocol (NDP). Even though the co
APA, Harvard, Vancouver, ISO, and other styles
16

El Ksimi, Ali, and Cherkaoui Leghris. "Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks." Security and Communication Networks 2018 (June 6, 2018): 1–11. http://dx.doi.org/10.1155/2018/1816462.

Full text
Abstract:
In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before sending the NS message, the new node uses the function SHA-512 to hash to the target
APA, Harvard, Vancouver, ISO, and other styles
17

Song, Guangjia, Hui Wang, and Fuquan Liu. "Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol." Security and Communication Networks 2020 (May 30, 2020): 1–15. http://dx.doi.org/10.1155/2020/2408792.

Full text
Abstract:
The It is very important for the corresponding author to have a linked ORCID (Open Researcher and Contributor ID) account on MTS. To register a linked ORCID account, please go to the Account Update page (http://mts.hindawi.com/update/) in our Manuscript Tracking System and after you have logged in click on the ORCID link at the top of the page. This link will take you to the ORCID website where you will be able to create an account for yourself. Once you have done so, your new ORCID will be saved in our Manuscript Tracking System automatically."?>SEND uses CGA as its address configuration m
APA, Harvard, Vancouver, ISO, and other styles
18

Deng, Yue Ming, Yuan An Liu, Xiao Lei Ma, and Jin Chun Gao. "Route Optimize Scheme for Nest NEMO in Aeronautical Communications." Applied Mechanics and Materials 651-653 (September 2014): 1929–32. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1929.

Full text
Abstract:
In NBSP, the mobility network keeps its connectivity with its own HA through its registration procedure therefore leading to pin-ball route in nNEMO, especially incurring serious latency for nest NEMO in aeronautical communications. To solve these limitations, we present RONAC which does some improvements on RA and UNA based on MIPv6 and IPv6 neighbor discovery protocol respectively and without introducing any new network entities.
APA, Harvard, Vancouver, ISO, and other styles
19

Grajzer, Monika, Tomasz Żernicki, and Mariusz Głąbowski. "ND++ - an extended IPv6 Neighbor Discovery protocol for enhanced stateless address autoconfiguration in MANETs." International Journal of Communication Systems 27, no. 10 (2012): 2269–88. http://dx.doi.org/10.1002/dac.2472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.

Full text
Abstract:
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent
APA, Harvard, Vancouver, ISO, and other styles
21

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering and Technology Research 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejeng.2019.4.12.1644.

Full text
Abstract:
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent
APA, Harvard, Vancouver, ISO, and other styles
22

Oh, Hayoung, and Sangsoon Lim. "Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (2016): 2352. http://dx.doi.org/10.11591/ijece.v6i5.10504.

Full text
Abstract:
<p><span lang="EN-US">The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focu
APA, Harvard, Vancouver, ISO, and other styles
23

Oh, Hayoung, and Sangsoon Lim. "Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (2016): 2352. http://dx.doi.org/10.11591/ijece.v6i5.pp2352-2361.

Full text
Abstract:
<p><span lang="EN-US">The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focu
APA, Harvard, Vancouver, ISO, and other styles
24

Krishnan, Indumathi Lakshmi, Fadi Al-Turjman, Ramesh Sekaran, Rizwan Patan, and Ching-Hsien Hsu. "A Novel Handover Mechanism of PMIPv6 for the Support of Multi-Homing Based on Virtual Interface." Sustainability 13, no. 21 (2021): 11743. http://dx.doi.org/10.3390/su132111743.

Full text
Abstract:
The Proxy Mobile IPv6 (PMIPv6) is a network-based accessibility managing protocol. Because of PMIPv6’s network-based approach, it accumulates the following additional benefits, such as discovery, efficiency. Nonetheless, PMIPv6 has inadequate sustenance for multi-homing mechanisms, since every mobility session must be handled through a different binding cache entry (BCE) at a local mobility anchor (LMA) according to the PMIPv6 specification, and thus PMIPv6 merely permits concurrent admittance for the mobile node (MN) which is present in the multi-homing concept. Consequently, when a multi-hom
APA, Harvard, Vancouver, ISO, and other styles
25

Sarma, Simanta. "Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process." IOSR Journal of Computer Engineering 16, no. 3 (2014): 22–31. http://dx.doi.org/10.9790/0661-16352231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Al Ani, Ahmed K., Ayad Hasan Adhab, and Emir Mahmood. "Review paper on neighbour discovery protocol in IPv6 link-local network." International Journal of Services Operations and Informatics 10, no. 1 (2019): 65. http://dx.doi.org/10.1504/ijsoi.2019.10022427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mahmood, Emir, Ayad Hasan Adhab, and Ahmed K. Al Ani. "Review paper on neighbour discovery protocol in IPv6 link-local network." International Journal of Services Operations and Informatics 10, no. 1 (2019): 65. http://dx.doi.org/10.1504/ijsoi.2019.100622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

El Ksimi, Ali, and Cherkaoui Leghris. "Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks." IET Networks 7, no. 4 (2018): 226–32. http://dx.doi.org/10.1049/iet-net.2017.0231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Machana, Jithender Reddy, and G. Narsimha. "Optimization of IPv6 Neighbor Discovery Protocol." Journal of Interconnection Networks, February 10, 2022. http://dx.doi.org/10.1142/s0219265921410255.

Full text
Abstract:
In IPv6, the DAD (Duplicate Address Detection) protocol detects duplicate addresses configured on the local link. Once the IPv6 address is auto configured on an IPv6 enabled host, the host verifies that its address is unique using the DAD procedure. This protocol works when hosts can communicate. If the DAD protocol fails to detect duplication, both the hosts assign the same link-local address. The neighbor discovery protocol verifies the generated address is unique or already exists on the local link. This process is known as Duplicate Address Detection (DAD). This process has critical securi
APA, Harvard, Vancouver, ISO, and other styles
30

Perumal, K., and M. Jessie Pauline Jeya Priya. "Handover Investigation and Neighbor Discovery Technique in Mobile IPV6." Indian Journal of Science and Technology 9, no. 32 (2016). http://dx.doi.org/10.17485/ijst/2016/v9i32/85043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

., Supriyanto, Iznan Hasbullah, Rajakumar Murugesan, and Azlan Osman. "Risk Analysis of the Implementation of IPv6 Neighbor Discovery in Public Network." Proceeding of the Electrical Engineering Computer Science and Informatics 1, no. 1 (2014). http://dx.doi.org/10.11591/eecsi.v1.340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sumadi, Fauzi Dwi Setiawan, and Didih Rizki Chandranegara. "Controller Based Proxy for Handling NDP in OpenFlow Network." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, November 10, 2018, 55–62. http://dx.doi.org/10.22219/kinetik.v4i1.720.

Full text
Abstract:
A significant method should be deployed in OpenFlow environment for reducing the complexity during the implementation of IPv6 neighbor discovery protocol (NDP) in multicast manner. This paper was performed for deploying reactive-based application in controller’s northbound layer for handling as well as cutting the Neighbor solicitation packet’s journey. The application had a capability for storing each of the incoming Neighbor Solicitation (NS) and Neighbor Advertisement (NA) packet information. Therefore, the controller could reply the NS packet directly by using OFPT_PACKET_OUT message that
APA, Harvard, Vancouver, ISO, and other styles
33

Amlak, Ghaith Mousa Hamzah, Firas Qays Kamal, and Ahmed K. Al-Ani. "Denial of Service Attack on Neighbor Discovery Protocol Processes in the Network of IPv6 Link- Local." International Journal of Electrical and Electronic Engineering & Telecommunications, 2020, 247–51. http://dx.doi.org/10.18178/ijeetc.9.4.247-251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!