Novel Duplicate Address Detection with Hash Function
نویسندگان
چکیده
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the "Hash_64" field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution.
منابع مشابه
Data Deduplication Report
The production of data is expanding at an astonishing pace. Data are exploding as companies and organizations collect and store increasing amounts of information. The huge amount of data require more storage, processing power and network bandwidth. To address this problem, data deduplication is being widely used. Hashing is widely used in data deduplication systems. Because hashing has many adv...
متن کاملHybrid Key Duplication Hashing Techniques for IP Address Lookup
In the past decade there has been an increasing need for designs to address the time and cost efficiency issues from various computer network applications such as general IP address lookup and specific network intrusion detection. Hashing techniques have been widely adopted for this purpose, among which XOR-operation-based hashing is one of most popular techniques due to its relatively small ha...
متن کاملElimination of Redundant Emails
Source code and Test data – 1 CD ii Abstract Email is using by hundred of millions of people worldwide. Unfortunately, the widespread use of email has given rise to several problems. Redundant email is one of them. In this project we are exploring a solution to that problem by examining the applicability of duplicate detection method in eliminating redundant emails. Following fingerprint techni...
متن کاملLaConf: A Localized Address Autoconfiguration Scheme for Wireless Ad Hoc Networks
We propose a localized address autoconfiguration (LaConf) scheme for wireless ad hoc networks. Address allocation information is maintained on the network border nodes, called addressing agents (AAs), which are locally identified by a geographic routing protocol GFG (Greedy-FACE-Greedy). When a node joins the network, it acquires an address from a neighboring AA (if any exists) by local communi...
متن کاملA Novel Approach of Node Clone Detection in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor...
متن کامل