Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks
In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this p...
        Saved in:
      
    
          | Published in | Security and communication networks Vol. 2018; no. 2018; pp. 1 - 11 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Cairo, Egypt
          Hindawi Publishing Corporation
    
        01.01.2018
     Hindawi John Wiley & Sons, Inc  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1939-0114 1939-0122 1939-0122  | 
| DOI | 10.1155/2018/1816462 | 
Cover
| Abstract | In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before sending the NS message, the new node uses the function SHA-512 to hash to the target address and use the last 64 bits in a new field and then encrypt the result with its private key. When receiving the secure message, the existing nodes decrypt it. Our algorithm is going to secure the DAD process by using a digital signature. Overall, this algorithm showed a significant effect in terms of the Address Configuration Success Probability (ACSP). | 
    
|---|---|
| AbstractList | In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before sending the NS message, the new node uses the function SHA-512 to hash to the target address and use the last 64 bits in a new field and then encrypt the result with its private key. When receiving the secure message, the existing nodes decrypt it. Our algorithm is going to secure the DAD process by using a digital signature. Overall, this algorithm showed a significant effect in terms of the Address Configuration Success Probability (ACSP). | 
    
| Author | Leghris, Cherkaoui El Ksimi, Ali  | 
    
| Author_xml | – sequence: 1 fullname: El Ksimi, Ali – sequence: 2 fullname: Leghris, Cherkaoui  | 
    
| BookMark | eNqF0M1LwzAYBvAgCs6Pm2cJeNRqkuajPYrfMJygnkOapVtm18wkW5l_vZEOBUE8hITkl5eHZw9st641ABxhdI4xYxcE4eICF5hTTrbAAJd5mSFMyPb3GdNdsBfCDCGOqaADIF9cp_w4QAUfTQcvm4nzNk7nMDo4WkQ7tx8GPjyteHq2k2nlPLy2QbuV8Wv4bPQy6TWs0_XzXDUNHFUzo2NIOnbOv4UDsFOrJpjDzb4PXm9vXq7us-Ho7uHqcpjpnKOYlYzzoh7nGImcjjGpNSaooqjkhggkhCnSUkoIkSuqTcFUhQVTtaYJoLLK90HWz122C7XuUhS58Hau_FpiJL_akV_tyE07yZ_0fuHd-9KEKGdu6dsUURLKmCh4QVlSpFfauxC8qaW2UUXr2uiVbf4affbr0z9JTns-te1YdfY_fdxrk4yp1Y8mOC8Jyz8BL-6ZVg | 
    
| CitedBy_id | crossref_primary_10_1080_03772063_2023_2208549 crossref_primary_10_1080_03772063_2024_2350931 crossref_primary_10_1007_s13369_018_3643_y crossref_primary_10_1109_ACCESS_2020_2970787 crossref_primary_10_32604_cmc_2021_014233 crossref_primary_10_1002_cpe_8131  | 
    
| Cites_doi | 10.1109/ACCESS.2017.2737524 10.3844/ajassp.2014.1472.1479 10.1016/j.ipl.2013.02.006 10.1007/s11277-014-1882-0 10.1007/978-981-10-0557-2_59 10.1080/19393555.2016.1180568 10.5120/18267-9305 10.1007/s13119-013-0018-2 10.1155/2017/5838657 10.1007/978-3-642-13405-0_11  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0  | 
    
| Copyright_xml | – notice: Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. – notice: Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0  | 
    
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY  | 
    
| DOI | 10.1155/2018/1816462 | 
    
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Technology Research Database CrossRef  | 
    
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1939-0122 | 
    
| Editor | Li, Wenjia | 
    
| Editor_xml | – sequence: 1 givenname: Wenjia surname: Li fullname: Li, Wenjia  | 
    
| EndPage | 11 | 
    
| ExternalDocumentID | 10.1155/2018/1816462 10_1155_2018_1816462 1213925  | 
    
| GroupedDBID | .4S .DC 05W 0R~ 123 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADJCN ADMLS ADNMO AEFGJ AEIMD AENEX AFBPY AGQPQ AGXDD AHFXO AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BHBCM BNHUX BOGZA BRXPI CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA H13 HVGLF HZ~ IX1 LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PUEGO ROL SUPJJ TH9 TUS W99 WBKPD XV2 1OC AAJEY AFKRA ARAPS BENPR BGLVJ CCPQU GROUPED_DOAJ HCIFZ IAO ICD ITC K7- PIMPY RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c360t-95668fd310734d12fc120b4096e27077e877eaa7773a4ce85ab175afc46e209b3 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1939-0114 1939-0122  | 
    
| IngestDate | Tue Aug 19 23:20:01 EDT 2025 Fri Jul 25 20:53:49 EDT 2025 Thu Apr 24 22:53:42 EDT 2025 Wed Oct 01 02:25:58 EDT 2025 Sun Jun 02 18:54:25 EDT 2024 Thu Sep 25 15:16:23 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2018 | 
    
| Language | English | 
    
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0 cc-by  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c360t-95668fd310734d12fc120b4096e27077e877eaa7773a4ce85ab175afc46e209b3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0001-7193-3113 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/scn/2018/1816462.pdf | 
    
| PQID | 2455786845 | 
    
| PQPubID | 1046363 | 
    
| PageCount | 11 | 
    
| ParticipantIDs | unpaywall_primary_10_1155_2018_1816462 proquest_journals_2455786845 crossref_citationtrail_10_1155_2018_1816462 crossref_primary_10_1155_2018_1816462 hindawi_primary_10_1155_2018_1816462 emarefa_primary_1213925  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-01-01 | 
    
| PublicationDateYYYYMMDD | 2018-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Cairo, Egypt | 
    
| PublicationPlace_xml | – name: Cairo, Egypt – name: London  | 
    
| PublicationTitle | Security and communication networks | 
    
| PublicationYear | 2018 | 
    
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc  | 
    
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc  | 
    
| References | 11 13 14 25 15 (16) 2017 (5) 2016; 10 2 (27) 2014; 3 4 (19) 2014 9 (23) 2016; 4 (22) 2014; 5 10 21  | 
    
| References_xml | – volume: 4 issue: 1 year: 2016 ident: 23 publication-title: IJEDR – ident: 2 doi: 10.1109/ACCESS.2017.2737524 – ident: 14 doi: 10.3844/ajassp.2014.1472.1479 – ident: 25 doi: 10.1016/j.ipl.2013.02.006 – ident: 10 doi: 10.1007/s11277-014-1882-0 – start-page: 1455 year: 2017 ident: 16 publication-title: International Journal on Recent and Innovation Trends in Computing and Communication – ident: 15 doi: 10.1007/978-981-10-0557-2_59 – ident: 9 doi: 10.1080/19393555.2016.1180568 – ident: 21 doi: 10.5120/18267-9305 – volume: 3 start-page: 8445 issue: 9 year: 2014 ident: 27 publication-title: International Journal of Engineering and Computer Science – ident: 13 doi: 10.1007/s13119-013-0018-2 – ident: 11 doi: 10.1155/2017/5838657 – year: 2014 ident: 19 publication-title: Internet-Draft – volume: 10 issue: n6 year: 2016 ident: 5 publication-title: International Journal of Computer and Information Engineering – volume: 5 start-page: 5708 issue: 4 year: 2014 ident: 22 publication-title: International Journal of Computer Science and Information Technologies – ident: 4 doi: 10.1007/978-3-642-13405-0_11  | 
    
| SSID | ssj0061474 | 
    
| Score | 2.1285844 | 
    
| Snippet | In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this... | 
    
| SourceID | unpaywall proquest crossref hindawi emarefa  | 
    
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 1 | 
    
| SubjectTerms | Algorithms Cryptography Digital signatures Internet Protocol IP (Internet Protocol) Nodes Security Statelessness  | 
    
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA86EPVB_HY6JQ_TFym2aZpkj0MdU9CJ22BvJWlTN9gXdnPMv97Lls1N8eOh0NJrWu6au98vOe4QyifMJVLF2uGmHiKNfc9RRDHHYxCdPZ0kTJoF_YdHVq7T-0bQsEWS0u9b-BDtgJ574goCEaPG164KZjK3nsuNmcOFAMPt5rFJ_fHoLL_9y7NLkWdNdyScQDhaaxryO2otQcz1YbcvxyPZbi9Em9I22rIwERendt1BK7q7izYXigfuobA2yXhNscTgqXCx_dIDot_s4EEPV8ARdFrvGt89vTG4DQwcbI1vWmlkUjbHuGrb1mHArLjagS_AFWWWZFKQniSGp_uoXrqtXZcd2y7BiXzmDhxgOkwkoG2YtTT2SBJ5xFXA35gm3OVcCzik5Jz7kppupVIBdpBJREHALSj_AGW6va4-QlgIP44jXySkIECUq4IE6OApn1EVREJn0eVMlWFka4mblhbtcMIpgiA0ig-t4rPofC7dn9bQ-EHu0FrlU4wAQiVBFuWtlf4YIDczYWinYhoSGoBXYoLCKBdzs_46zvH_XneCNszldEEmhzKD16E-BYgyUGeTH_QD7JnZiQ priority: 102 providerName: Hindawi Publishing  | 
    
| Title | Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks | 
    
| URI | https://search.emarefa.net/detail/BIM-1213925 https://dx.doi.org/10.1155/2018/1816462 https://www.proquest.com/docview/2455786845 https://downloads.hindawi.com/journals/scn/2018/1816462.pdf  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 2018 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0122 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access (WRLC) customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED-xIjR42CfbujHkB7aXKSVxbMcVT9U21E0aIKBSJ02KbMcZFW2KSAqCv55z4wCdtA_tIVGinC6x73J3P-dyB7CVi5AqndkgcfUQWRZHgaZaBJFA7xzZPBfKLeh_2xP9Afs65MMl2Gn-hclcifipysrOicOkl6O5tfbzWm6XpkC4HsltdEyCCQSFWf4AlgXHQLwFy4O9g973-juyywKK2N0xpU3aO-cLLBYc0oqdKDxAL7Xi778QeT6cFWfq6lKNx_ec0O5j-NE8fp17ctqZVbpjrn-p7Pif43sCj3xwSnq1Nj2FJVs8g7V7JQufQ3o8z7MtiSJoH0lv_HN6PqpOJqSakn00P5PRtSVfDi4EXkbcjxpGPo1K4xJFr8iRb5ZHMFImRxMcINnXbiGoROp5Onq5DoPdz8cf-4Fv0hCYWIRVgPhKyBxljLaCZRHNTURDjahRWJqESWIlbkolSRIr5nqkKo0Ri8oNQ4Kwq-MX0CqmhX0FRMo4y0wsc9qVSJrorsKAJdKxYJobadvwoZFUanwFc9dIY5zOkQznqZu61E9dG97dUp_VlTt-Q_fSC_2OjGJcTHkbtryQ_sJgo9GQtBFkShlHWygkQy7vb7Xmj3xe_yvhG1h1p_VC0Aa0qvOZfYuhUaU3ERQcUtwf9oeb_nW4Ac3MB6A | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED-xIjR4YOwDKDDkB7aXKSVxbMcVT9U2xCYNkKASkyZFtuOMijZFJAXBX8-5cYBO2of2EMlRTpfYd7n7nXO5A9jJRUiVzmyQuHqILIujQFMtgkigd45sngvlNvS_HYqDPvt6xs_mYK_5FyZzJeLHKis75y4mvRlMrbVf13K3NAWG65HcRcckmMCgMMufwbzgCMRbMN8_PO59r78juyygiD2OKW3S3jmfYTHjkBbsSOEAvdSCv_8M8nw-KS7V7Y0aDp84of0X8KN5_Dr35KIzqXTH3P1S2fE_57cCyx6ckl6tTS9hzhavYOlJycLXkJ5O82xLogjaR9Ib_hxfDarzEanG5AjNz2hwZ8mX42uBlzHuRw0jnwalcYmit-TEN8sjiJTJyQgnSI602wgqkXqajl6-gf7-59OPB4Fv0hCYWIRVgPGVkDnKGG0FyyKam4iGGqNGYWkSJomVeCiVJEmsmOuRqjQiFpUbhgRhV8er0CrGhV0HImWcZSaWOe1KJE10VyFgiXQsmOZG2jZ8aCSVGl_B3DXSGKbTSIbz1C1d6peuDe8eqC_ryh2_oVvzQn8ko4iLKW_DjhfSXxhsNRqSNoJMKeNoC4VkyOX9g9b8kc_GvxJuwqI7rTeCtqBVXU3sW4RGld72r8A9hAYFpA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+a+New+Algorithm+to+Optimize+IPv6+Neighbor+Discovery+Security+for+Small+Objects+Networks&rft.jtitle=Security+and+communication+networks&rft.au=Ali+El+Ksimi&rft.au=Cherkaoui+Leghris&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F1816462&rft.externalDBID=NO_FULL_TEXT | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |