Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Preventing bad prefixes attack in IPv6 stateless address auto-configuration protocol(2012) Doshi, R.D.; Chandavarkar, B.R.Stateless address auto-configuration protocol in IPv6 is found to be vulnerable to bad prefixes attack wherein malicious node in the network can misconfigure hosts in the network so as to cause disruption in the communication between nodes in the same subnet or in different subnets. This paper proposes solution to prevent this type of attack. Initially this paper demonstrates existence of such vulnerability in Linux operating system. At the end of this paper implementation of prevention technique and results are presented. © 2012 IEEE.Item Prevention of MITM attack caused by rogue router advertisements in IPv6(Institute of Electrical and Electronics Engineers Inc., 2017) Ouseph, C.; Chandavarkar, B.R.Router discovery in IPv6 is vulnerable to rogue Router Advertisements (RAs), wherein unintended and possibly incorrect RAs make their way into the network. An IPv6 host obtains several important information from an RA like the default router's address and the prefix for autoconfiguring its IPv6 address. Incorrect data in the RA fields result in operational problems in the network. This can occur as a result of misconfigurations or malicious intentions. A variation of this security threat occurs in the form of a node sending a rogue RA with the spoofed address of the legit router but with the router lifetime field set to zero. This causes the legit router to be removed as the default router for hosts on the subnet. Further, the malicious node could advertise itself as the default router and essentially perform a man-in-The-middle (MITM) attack. This paper demonstrates such a possibility on an IPv6 testbed and presents a possible solution to prevent the same. The implementation of the solution is done on the Linux kernel and results testifying the solution are presented. © 2016 IEEE.Item Survey on routing protocols for Internet of Things(Institute of Electrical and Electronics Engineers Inc., 2017) Bhat, A.; Geetha, V.As Wireless Sensor Network nodes are ID based network, it would be difficult to monitor the status of the same when it is connected to Internet of Things. So gateway is required to connect the network with Internet. In order to access and manage the network remotely, it is good to have IP based devices connected with each other. As IPv4 is being depleted, IPv6 was a solution for much larger address space. IP connectivity in sensor networks mainly depend on two IETF standards: 6LoWPAN and RPL. Routing protocol in 6LoWPAN is very precise due to limited node's potential. Existing protocol of 6LoWPAN does not satisfy Low power Lossy networks. IETF came up with IPv6 routing protocol for low power Lossy networks called RPL. © 2017 IEEE.
