Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks

In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this p...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2018; no. 2018; pp. 1 - 11
Main Authors El Ksimi, Ali, Leghris, Cherkaoui
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
Hindawi
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
1939-0122
DOI10.1155/2018/1816462

Cover

Abstract In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before sending the NS message, the new node uses the function SHA-512 to hash to the target address and use the last 64 bits in a new field and then encrypt the result with its private key. When receiving the secure message, the existing nodes decrypt it. Our algorithm is going to secure the DAD process by using a digital signature. Overall, this algorithm showed a significant effect in terms of the Address Configuration Success Probability (ACSP).
AbstractList In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this process is subject to many attacks and the security is willing to be the most important issues in Small Object Networks with IPv6. In this paper, we developed a new algorithm to optimize the security in IPv6-DAD process; this method is based on SHA-512 to verify the identity of the Neighbor Discovery messages transmitted in the link local. First, before sending the NS message, the new node uses the function SHA-512 to hash to the target address and use the last 64 bits in a new field and then encrypt the result with its private key. When receiving the secure message, the existing nodes decrypt it. Our algorithm is going to secure the DAD process by using a digital signature. Overall, this algorithm showed a significant effect in terms of the Address Configuration Success Probability (ACSP).
Author Leghris, Cherkaoui
El Ksimi, Ali
Author_xml – sequence: 1
  fullname: El Ksimi, Ali
– sequence: 2
  fullname: Leghris, Cherkaoui
BookMark eNqF0M1LwzAYBvAgCs6Pm2cJeNRqkuajPYrfMJygnkOapVtm18wkW5l_vZEOBUE8hITkl5eHZw9st641ABxhdI4xYxcE4eICF5hTTrbAAJd5mSFMyPb3GdNdsBfCDCGOqaADIF9cp_w4QAUfTQcvm4nzNk7nMDo4WkQ7tx8GPjyteHq2k2nlPLy2QbuV8Wv4bPQy6TWs0_XzXDUNHFUzo2NIOnbOv4UDsFOrJpjDzb4PXm9vXq7us-Ho7uHqcpjpnKOYlYzzoh7nGImcjjGpNSaooqjkhggkhCnSUkoIkSuqTcFUhQVTtaYJoLLK90HWz122C7XuUhS58Hau_FpiJL_akV_tyE07yZ_0fuHd-9KEKGdu6dsUURLKmCh4QVlSpFfauxC8qaW2UUXr2uiVbf4affbr0z9JTns-te1YdfY_fdxrk4yp1Y8mOC8Jyz8BL-6ZVg
CitedBy_id crossref_primary_10_1080_03772063_2023_2208549
crossref_primary_10_1080_03772063_2024_2350931
crossref_primary_10_1007_s13369_018_3643_y
crossref_primary_10_1109_ACCESS_2020_2970787
crossref_primary_10_32604_cmc_2021_014233
crossref_primary_10_1002_cpe_8131
Cites_doi 10.1109/ACCESS.2017.2737524
10.3844/ajassp.2014.1472.1479
10.1016/j.ipl.2013.02.006
10.1007/s11277-014-1882-0
10.1007/978-981-10-0557-2_59
10.1080/19393555.2016.1180568
10.5120/18267-9305
10.1007/s13119-013-0018-2
10.1155/2017/5838657
10.1007/978-3-642-13405-0_11
ContentType Journal Article
Copyright Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris.
Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris.
– notice: Copyright © 2018 Ali El Ksimi and Cherkaoui Leghris. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1155/2018/1816462
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

CrossRef

Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Li, Wenjia
Editor_xml – sequence: 1
  givenname: Wenjia
  surname: Li
  fullname: Li, Wenjia
EndPage 11
ExternalDocumentID 10.1155/2018/1816462
10_1155_2018_1816462
1213925
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADJCN
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AHFXO
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
1OC
AAJEY
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
K7-
PIMPY
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c360t-95668fd310734d12fc120b4096e27077e877eaa7773a4ce85ab175afc46e209b3
IEDL.DBID UNPAY
ISSN 1939-0114
1939-0122
IngestDate Tue Aug 19 23:20:01 EDT 2025
Fri Jul 25 20:53:49 EDT 2025
Thu Apr 24 22:53:42 EDT 2025
Wed Oct 01 02:25:58 EDT 2025
Sun Jun 02 18:54:25 EDT 2024
Thu Sep 25 15:16:23 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2018
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-95668fd310734d12fc120b4096e27077e877eaa7773a4ce85ab175afc46e209b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7193-3113
OpenAccessLink https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/scn/2018/1816462.pdf
PQID 2455786845
PQPubID 1046363
PageCount 11
ParticipantIDs unpaywall_primary_10_1155_2018_1816462
proquest_journals_2455786845
crossref_citationtrail_10_1155_2018_1816462
crossref_primary_10_1155_2018_1816462
hindawi_primary_10_1155_2018_1816462
emarefa_primary_1213925
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2018
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References 11
13
14
25
15
(16) 2017
(5) 2016; 10
2
(27) 2014; 3
4
(19) 2014
9
(23) 2016; 4
(22) 2014; 5
10
21
References_xml – volume: 4
  issue: 1
  year: 2016
  ident: 23
  publication-title: IJEDR
– ident: 2
  doi: 10.1109/ACCESS.2017.2737524
– ident: 14
  doi: 10.3844/ajassp.2014.1472.1479
– ident: 25
  doi: 10.1016/j.ipl.2013.02.006
– ident: 10
  doi: 10.1007/s11277-014-1882-0
– start-page: 1455
  year: 2017
  ident: 16
  publication-title: International Journal on Recent and Innovation Trends in Computing and Communication
– ident: 15
  doi: 10.1007/978-981-10-0557-2_59
– ident: 9
  doi: 10.1080/19393555.2016.1180568
– ident: 21
  doi: 10.5120/18267-9305
– volume: 3
  start-page: 8445
  issue: 9
  year: 2014
  ident: 27
  publication-title: International Journal of Engineering and Computer Science
– ident: 13
  doi: 10.1007/s13119-013-0018-2
– ident: 11
  doi: 10.1155/2017/5838657
– year: 2014
  ident: 19
  publication-title: Internet-Draft
– volume: 10
  issue: n6
  year: 2016
  ident: 5
  publication-title: International Journal of Computer and Information Engineering
– volume: 5
  start-page: 5708
  issue: 4
  year: 2014
  ident: 22
  publication-title: International Journal of Computer Science and Information Technologies
– ident: 4
  doi: 10.1007/978-3-642-13405-0_11
SSID ssj0061474
Score 2.1285844
Snippet In order to verify the uniqueness of link-local or unicast addresses, nodes must perform a Duplicate Address Detection process before using them. However, this...
SourceID unpaywall
proquest
crossref
hindawi
emarefa
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Cryptography
Digital signatures
Internet Protocol
IP (Internet Protocol)
Nodes
Security
Statelessness
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA86EPVB_HY6JQ_TFym2aZpkj0MdU9CJ22BvJWlTN9gXdnPMv97Lls1N8eOh0NJrWu6au98vOe4QyifMJVLF2uGmHiKNfc9RRDHHYxCdPZ0kTJoF_YdHVq7T-0bQsEWS0u9b-BDtgJ574goCEaPG164KZjK3nsuNmcOFAMPt5rFJ_fHoLL_9y7NLkWdNdyScQDhaaxryO2otQcz1YbcvxyPZbi9Em9I22rIwERendt1BK7q7izYXigfuobA2yXhNscTgqXCx_dIDot_s4EEPV8ARdFrvGt89vTG4DQwcbI1vWmlkUjbHuGrb1mHArLjagS_AFWWWZFKQniSGp_uoXrqtXZcd2y7BiXzmDhxgOkwkoG2YtTT2SBJ5xFXA35gm3OVcCzik5Jz7kppupVIBdpBJREHALSj_AGW6va4-QlgIP44jXySkIECUq4IE6OApn1EVREJn0eVMlWFka4mblhbtcMIpgiA0ig-t4rPofC7dn9bQ-EHu0FrlU4wAQiVBFuWtlf4YIDczYWinYhoSGoBXYoLCKBdzs_46zvH_XneCNszldEEmhzKD16E-BYgyUGeTH_QD7JnZiQ
  priority: 102
  providerName: Hindawi Publishing
Title Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks
URI https://search.emarefa.net/detail/BIM-1213925
https://dx.doi.org/10.1155/2018/1816462
https://www.proquest.com/docview/2455786845
https://downloads.hindawi.com/journals/scn/2018/1816462.pdf
UnpaywallVersion publishedVersion
Volume 2018
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0122
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access (WRLC)
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED-xIjR42CfbujHkB7aXKSVxbMcVT9U21E0aIKBSJ02KbMcZFW2KSAqCv55z4wCdtA_tIVGinC6x73J3P-dyB7CVi5AqndkgcfUQWRZHgaZaBJFA7xzZPBfKLeh_2xP9Afs65MMl2Gn-hclcifipysrOicOkl6O5tfbzWm6XpkC4HsltdEyCCQSFWf4AlgXHQLwFy4O9g973-juyywKK2N0xpU3aO-cLLBYc0oqdKDxAL7Xi778QeT6cFWfq6lKNx_ec0O5j-NE8fp17ctqZVbpjrn-p7Pif43sCj3xwSnq1Nj2FJVs8g7V7JQufQ3o8z7MtiSJoH0lv_HN6PqpOJqSakn00P5PRtSVfDi4EXkbcjxpGPo1K4xJFr8iRb5ZHMFImRxMcINnXbiGoROp5Onq5DoPdz8cf-4Fv0hCYWIRVgPhKyBxljLaCZRHNTURDjahRWJqESWIlbkolSRIr5nqkKo0Ri8oNQ4Kwq-MX0CqmhX0FRMo4y0wsc9qVSJrorsKAJdKxYJobadvwoZFUanwFc9dIY5zOkQznqZu61E9dG97dUp_VlTt-Q_fSC_2OjGJcTHkbtryQ_sJgo9GQtBFkShlHWygkQy7vb7Xmj3xe_yvhG1h1p_VC0Aa0qvOZfYuhUaU3ERQcUtwf9oeb_nW4Ac3MB6A
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED-xIjR4YOwDKDDkB7aXKSVxbMcVT9U2xCYNkKASkyZFtuOMijZFJAXBX8-5cYBO2of2EMlRTpfYd7n7nXO5A9jJRUiVzmyQuHqILIujQFMtgkigd45sngvlNvS_HYqDPvt6xs_mYK_5FyZzJeLHKis75y4mvRlMrbVf13K3NAWG65HcRcckmMCgMMufwbzgCMRbMN8_PO59r78juyygiD2OKW3S3jmfYTHjkBbsSOEAvdSCv_8M8nw-KS7V7Y0aDp84of0X8KN5_Dr35KIzqXTH3P1S2fE_57cCyx6ckl6tTS9hzhavYOlJycLXkJ5O82xLogjaR9Ib_hxfDarzEanG5AjNz2hwZ8mX42uBlzHuRw0jnwalcYmit-TEN8sjiJTJyQgnSI602wgqkXqajl6-gf7-59OPB4Fv0hCYWIRVgPGVkDnKGG0FyyKam4iGGqNGYWkSJomVeCiVJEmsmOuRqjQiFpUbhgRhV8er0CrGhV0HImWcZSaWOe1KJE10VyFgiXQsmOZG2jZ8aCSVGl_B3DXSGKbTSIbz1C1d6peuDe8eqC_ryh2_oVvzQn8ko4iLKW_DjhfSXxhsNRqSNoJMKeNoC4VkyOX9g9b8kc_GvxJuwqI7rTeCtqBVXU3sW4RGld72r8A9hAYFpA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+a+New+Algorithm+to+Optimize+IPv6+Neighbor+Discovery+Security+for+Small+Objects+Networks&rft.jtitle=Security+and+communication+networks&rft.au=Ali+El+Ksimi&rft.au=Cherkaoui+Leghris&rft.date=2018-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2018&rft_id=info:doi/10.1155%2F2018%2F1816462&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon