117
Views
1
CrossRef citations to date
0
Altmetric
Review Articles

IPv6 Addressing Scheme with a Secured Duplicate Address Detection

&

References

  • D. Evans, Cisco Systems (2011). The internet of things how the next evolution of the internet is changing everything [Online]. Available: http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.
  • G. Kumar, and P. Tomar, “A survey of IPv6 addressing schemes for internet of things,” International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 2, no. 2, pp. 43–57, 2018. doi: 10.4018/IJHIoT.2018070104
  • F. Gont, A. Cooper, and D. Thaler, “Security and privacy considerations for IPv6 address generation mechanisms,” Internet Engineering Task Force, RFC 7721 2016.
  • F. Gont, A. Cooper, D. Thaler, and W. Liu, “Recommendation on stable IPv6 interface identifiers,” Internet Engineering Task Force, RFC 8064 2017.
  • T. Savolainen, J. Soininen, and B. Silverajan, “IPv6 addressing strategies for IoT,” IEEE Sensor Journal, Vol. 13, no. 10, pp. 3511–3519, 2013. doi: 10.1109/JSEN.2013.2259691
  • T. Narten, E. Nordmark, W. Simpson, and H. Siliman. Neighbor discovery for IP version 6 (IPv6). Available: http://www.ietf.org/rfc/rfc4861.txt.
  • F. Gont. “A method for generating semantically opaque interface identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)”, Internet Engineering Task Force, RFC 7217, 2014.
  • S. A. Abdullah. “SEUI-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks”, Engineering Science and Technology, an International Journal, Dec 2018.
  • G. Song, and Z. Ji, “Novel duplicate address detection with hash function,” PLoS ONE, Vol. 11, no. 3, e0151612, March 2016. doi: 10.1371/journal.pone.0151612
  • E. Dart, W. Beebee, W. George, R. Asati, C. Pignataro, and H. Singh. “Enhanced duplicate address detection,” Internet Engineering Task Force, Fremont, CA, USA, RFC 7527, 2015.
  • X. Wang, and H. Qian, “Hierarchical and low-power IPv6 address configuration for wireless sensor networks,” Int. J. Commun. Syst., Vol. 25, no. 12, pp. 1513–1529, 2012. doi: 10.1002/dac.1318
  • S. R. Hussain, S. Saha, and A. Rahman, “SAAMAN: scalable address autoconfiguration in mobile ad hoc networks,” J. Netw. Syst. Manage, Vol. 19, no. 3, pp. 394–426, 2011. doi: 10.1007/s10922-010-9187-4
  • H. Shin, E. Talipov, and H. Cha, “Spectrum: lightweight hybrid address autoconfiguration protocol based on virtual coordinates for 6LoWPAN,” IEEE Trans. Mobile Comput, Vol. 11, no. 11, pp. 1749–1762, Nov. 2012. doi: 10.1109/TMC.2011.235
  • M. Mavani, and K. Asawa. Privacy preserving IPv6 address auto-configuration for internet of things. In: Hu YC., Tiwari S., Mishra K., Trivedi M. (eds) Intelligent communication and computational technologies. Lecture notes in networks and systems, vol 19. Springer, Singapore. 2018.
  • X. Wang, H. Cheng, and Y. Yao, “Addressing with an improved DAD for 6LoWPAN,” IEEE Commun. Lett., Vol. 20, no. 1, pp. 73–76, January 2016. doi: 10.1109/LCOMM.2015.2499250
  • P. Pandey. “Prevention of ARP spoofing: a probe packet based technique,” in Proc. IEEE 3rd Int. Adv. Comput. Conf. (IACC’13), 2013, pp. 147–153.
  • X. Wang, and Y. Mu, “A secure IPv6 address configuration scheme for a MANET,” Secur. Commun. Netw., Vol. 6, no. 6, pp. 777–789, 2013. doi: 10.1002/sec.611
  • IEEE Computer Society, “Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate WirelessPersonal Area Networks (WPANs),” IEEE Standard, Vol. 802.15.4 (Aug. 2006).
  • B. Carpenter, and S. Jiang, “Significance of IPv6 interface identifiers,” Internet Engineering Task Force, RFC 7136 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.