Novel Duplicate Address Detection with Hash Function

PLoS One. 2016 Mar 18;11(3):e0151612. doi: 10.1371/journal.pone.0151612. eCollection 2016.

Abstract

Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the "Hash_64" field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution.

Publication types

  • Research Support, Non-U.S. Gov't

MeSH terms

  • Algorithms*
  • Computer Security*
  • Computer Simulation
  • Computers
  • Internet*
  • Software
  • Wireless Technology

Grants and funding

This work was supported by the National Natural Science Foundation of China (grant no. 61173024), http://isisn.nsfc.gov.cn/egrantindex/funcindex/prjsearch-list. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.