PDF
(885KB)
Abstract
Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node. The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.
Keywords
Network security
/
Address resolution
/
Neighbor discovery
/
Anonymous
Cite this article
Download citation ▾
Guang-jia SONG, Zhen-zhou JI.
Anonymous-address-resolution model.
Front. Inform. Technol. Electron. Eng, 2016, 17(10): 1044-1055 DOI:10.1631/FITEE.1500382
| [1] |
AlSa’deh, A., Rafiee, H., Meinel, C., 2012. Stopping time condition for practical IPv6 cryptographically generated addresses. 26th IEEE Int. Conf. on Information Networking, p.257–162.
|
| [2] |
Arkko, J., Kempf, J., Zill, B., , 2005. SEcure Neighbor Discovery (SEND). Internet Engineering Task Force. Available from
|
| [3] |
Ataullah, M., Chauhan, N., 2012. ES-ARP: an efficient and secure address resolution protocol. IEEE Students’ Conf. on Electrical, Electronics & Computer Science, p.1–5.
|
| [4] |
Barbhuiya, F.A., Biswas, S., Nandi, S., 2011. An active DES based IDS for ARP spoofing. IEEE Int. Conf. on Systems, Man & Cybernetics, p.2743–2748.
|
| [5] |
Bruschi, D., Ornaghi, A., Rosti, E., 2003. S-ARP: a secure address resolution protocol. IEEE 19th Annual Computer Security Applications Conf., p.66–74.
|
| [6] |
Fall, K.R., Stevens, W.R., 2011. TCP/IP Illustrated, Volume I: the Protocols. Addison-Wesley, London.
|
| [7] |
Garcia-Martine, A., Bagnulo, M., 2012. An integrated approach to prevent address spoofing in IPv6 links. IEEE Commun. Lett., 16(11):1900–1902.
|
| [8] |
Gouda, M.G., Huang, C.T., 2003. A secure address resolution protocol. Comput. Netw., 41(1):57–71.
|
| [9] |
Goyal, V., Tripathy, R., 2005. An efficient solution to the ARP cache poisoning problem. LNCS, 3574:40–51.
|
| [10] |
Hou, Y., Wang, Z., Wang, Y., , 2012. Routing attack in the ND and SEND mixed environment. 4th IEEE Int. Conf. on Multimedia Information Networking and Security, p.959–962.
|
| [11] |
Issac, B., Mohammed, L.A., 2005. Secure unicast address resolution protocol (S-UARP) by extending DHCP. 13th IEEE Int. Conf. on Networks, p.1–6.
|
| [12] |
Kumar, N., Bansal, G., Biswas, S., , 2013. Host based IDS for NDP related attacks: NS and NA spoofing. Annual IEEE India Conf., p.1–6.
|
| [13] |
Li, J., Wu, J., Xu, K., , 2012. A hierarchical interdomain authenticated source address validation solution. Chin. J. Comput., 35(1):85–100 (in Chinese).
|
| [14] |
Nam, S.Y., Kim, D., Kim, J., 2010. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Commun. Lett., 14(2):187–189.
|
| [15] |
Narten, T., Nordmark, E., Simpson, W., , 2007. Neighbor Discovery for IP Version 6 (IPv6). Internet Engineering Task Force. Available fromhttp://tools.IETF
|
| [16] |
Oh, H., Chae, K., 2007. An efficient security management in IPv6 network via MCGA. 9th Int. Conf. on Advanced Communication Technology, p.1179–1181.
|
| [17] |
Oh, M., Kim, Y.G., Hong, S., , 2012. ASA: agent-based secure ARP cache management. IET Commun., 6(7): 685–693.
|
| [18] |
Plummer, D.C., 1982. An Ethernet Address Resolution Protocol—or—Converting Network Protocol Addresses to 48.Bit Ethernet Address for Transmission on Ethernet Hardware. Internet Engineering Task Force. Available from
|
| [19] |
Rafiee, H., AlSa’deh, A., Meinel, C., 2011. WinsSEND: Windows SEcure Neighbor Discovery. 4th Int. Conf. on Security of Information and Networks, p.243–246.
|
| [20] |
Rehman, S.U., Manickam, S., 2015. Integrated framework to detect and mitigate denial of service (DoS) attacks on duplicate address detection process in IPv6 link local communication. Int. J. Secur. Appl., 9(11):77–86.
|
| [21] |
Stinson, D.R., 2005. Cryptography: Theory and Practice. CRC Press.
|
| [22] |
Su, G., Wang, W., Gong, X., , 2010. A quick CGA generation method. 2nd IEEE Int. Conf. on Future Computer and Communication, p.769–773.
|
| [23] |
van Heuse, M., 2016. THC IPv6. Available from
|
| [24] |
Wang, X., Yu, H., 2005. How to break MD5 and other hash functions. Int. Conf. on Theory & Applications of Cryptographic Techniques, p.19–35.
|
| [25] |
Wang, X., Lai, X., Feng, D., , 2005. Cryptanalysis of the hash functions MD4 and RIPEMD. LNCS, 3494:1–18.
|
| [26] |
Wu, J., Ren, G., Li, X., 2007. Source address validation: architecture and protocol design. IEEE Int. Conf. on Network Protocols, p.276–283.
|
| [27] |
Wu, J., Bi, J., Li, X., , 2008. A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience. Internet Engineering TaskForce. Available from
|
| [28] |
Xiao, P., Bi, J., 2013. OpenFlow based intra-AS source address validation. J. Chin. Comput. Syst., 34(9):1999–2003 (in Chinese).
|
RIGHTS & PERMISSIONS
Zhejiang University and Springer-Verlag Berlin Heidelberg
PDF
(885KB)