Title :
Analysis of SEND Protocol through Implementation and Simulation
Author :
An, Gaeil ; Kim, Kiyoung ; Jang, Jongsoo ; Jeon, Yonghee
Author_Institution :
Electron. & Telecommun. Res. Inst. (ETRI), Daejeon
Abstract :
Neighbor Discovery (ND) protocol has been proposed to discover neighboring hosts and routers in IPv6 wired or wireless local networks. Even though ND protocol is very useful, it has a weakness to security because it allows a malicious user to impersonate a legitimate host or a router by forging ND protocol messages. To address the security problem, IETF (Internet Engineering Task Force) has proposed SEcure Neighbor Discovery (SEND) protocol. The key functions of SEND protocol include address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism. In this paper, we analyze SEND protocol in the view point of security through several experiments. For this, we implement SEND protocol in IPv6 real system and develop a simulation environment. Based on the experimental results, we also propose a monitoring-based ND message differentiation scheme which is able to make up for security vulnerability of SEND protocol effectively.
Keywords :
Internet; message authentication; mobile radio; telecommunication network routing; telecommunication security; transport protocols; wireless LAN; IPv6; SEND protocol; address ownership proof mechanism; message protection mechanism; mobile network; monitoring-based ND message differentiation scheme; reply attack prevention mechanism; router authentication mechanism; secure neighbor discovery protocol; wireless local network; Analytical models; Authentication; Broadcasting; Internet; Monitoring; Neodymium; Network servers; Protection; Security; Wireless application protocol;
Conference_Titel :
Convergence Information Technology, 2007. International Conference on
Conference_Location :
Gyeongju
Print_ISBN :
0-7695-3038-9
DOI :
10.1109/ICCIT.2007.403