Dissertation > Excellent graduate degree dissertation topics show

Research of Security Threats Based on IPv6 Neighbor Discovery Protocol

Author: ZhangCui
Tutor: LuKaiNing
School: Tianjin University
Course: Electronics and Communication Engineering
Keywords: IPv6 Neighbor discovery protocol AH Libnet Security threats
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 99
Quote: 0
Read: Download Dissertation


IPv6 will gradually replace IPv4 as the next generation of the Internet protocol. It will gain widespread deployment as a significant evolution of IPv4. Neighbor Discovery Protocol (NDP) is a network layer protocol in IPv6 protocol stack, and it is mainly used for solving the interconnection problems among all nodes on the same link. However, with the widespread use of IPv6, NDP becomes a vulnerable target of most attacks because of the lack of security mechanisms. Though, IPSec, the default security protocol in IPv6, is used to protect IP and upper layer protocols, and Authentication Header (AH) protocol can provide data integrity and identical authentication services, Internet Key Exchange (IKE) can only handle unicast communication between point to point, and can not be used for multicast communication.This dissertation introduces basic protocols in IPv6, analyses IPSec, Neighbor Discovery Protocol, and security threats of NDP. Then, combined with IPSec authentication system, the improved program which introduces AH protocol into Neighbor Discovery Protocol to provide authentication for data packets and ensure communication safety is proposed. In order to prevent a variety of attacks by forgering NDP packets, an improved strategy based on IPSec AH and the binding address is given. In order to solve the key management problem, the implementation of key management scheme for neighbor multicast communication is discussed in detail. At last, the implementation of redirect attacks basing on forging NS/NA is simulated using Libnet Development Packet. By comparing the attack impacts before and after the introduction of AH authentication mechanism, the effectiveness of improved program for ensuring neighbor discovery protocol security is verified.From the results of the simulation we can see that the improved program can effectively defense a variety of redirect and denial of service attacks that forge NDP packets, and guarantee the safety of neighbor discovery process. As the core of IPv6 network security, IPSec can also seamlessly connect with NDP. Therefore, this improved program has certain significance for strengthening the security of IPv6 network.

Related Dissertations

  1. Reseach of Mobile IP Routing in Satellite Networks,TN929.5
  2. The Research and Application of IPTV Terminal System Based on the Next Generation of Internet,TN949.292
  3. Research and Design of Linked IPS for IPv6 Based on Multi-core Network Processor,TP393.04
  4. Hunan Railway Professional Technical College Campus Network Security System Research and Implementation,TP393.18
  5. Research on high-speed IPv6 IPsec security gateway,TP393.08
  6. Globalization National Culture Security Studies,G122
  7. \,I046
  8. Untersuchung Der Satire in Den Lu Xuns Werken Aus Der Perspektive Der Pragmatik,H13
  9. IPSec-based network security protocols Research and Implementation,TP393.08
  10. Network Safety Research and Realization Based on IPSec and SSL VPN,TP393.08
  11. Intranet IPv6 Transition Network Integration Platform,TP393.04
  12. Design and Implementation of IPSec NAT Traversal,TP393.04
  13. AH Index feasibility and applied research,G350
  14. Research and Design of IDS Based on IPv6,TP393.08
  15. Design and Implementation of Embedded IPSec,TP393.08
  16. Tibet, Mongolia and Asia ah skarn-type lead-zinc deposits geology geochemistry and the source of study,P618.4
  17. The Collision between Chinese and Western Drama View and the Regression of Chinese Opera View,I207.3
  18. A Study of Willa Cather’s Persistent Pursuit of Androgyny as Reflected by Her Novel O Pioneers!,I712
  19. On Fiction Translation from the Perspective of Relevance Theory,I046
  20. Tunnel Recognition Technology Based on Decision Tree,TP393.04
  21. Research on the Disclosure of Infrequent Earning,F275

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile