• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    IPv6 Cryptographically Generated Address:Analysis,Optimization and Protection

    2021-12-14 09:57:20AmjedSidAhmedRosilahHassanFaizanQamarandMazharMalik
    Computers Materials&Continua 2021年7期

    Amjed Sid Ahmed,Rosilah Hassan,Faizan Qamar and Mazhar Malik

    1Department of Computing and Information Technology,Global College of Engineering and Technology,Ruwi,112,Sultanate of Oman

    2Faculty of Information Science and Technology,Center for Cyber Security,Universiti Kebangsaan Malaysia,Bangi,43600,Malaysia

    3Faculty of Information Science and Technology,Universiti Kebangsaan Malaysia,43600,Bangi,Malaysia

    Abstract: In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective, this method is still subject to several vulnerabilities with respect to security, in addition to certain limitations in its performance.In this study, the authors present an intensive systematic review of the literature to explore the technical specifications of CGA, its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process, this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.FulfillingHash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm (SHA1) with the Message Digest (MD5) hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process, which compromise and threaten the privacy of CGA.Therefore, we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious.

    Keywords: IPv6; GCA; SEND; DoS attacks; RSA; SHA-1

    1 Introduction

    In the present era, a huge increase in the number of hosts on the Internet is observed;thus, communication and networking experts expect Internet protocol version 4 (IPv4) to be replaced by IPv6 [1–3].The IPv6 suite primary protocol is a neighbor discovery protocol (NDP),which is considered as a replacement for the address resolution protocol (ARP) function in IPv4 [4].The NDP protocol performs an array of functions (definite router functions) that are related to nonrouter or host-specified functions.Moreover, the NDP protocol performs multiple tasks, including node examination, duplicate address detection, stateless address auto configuration(SLACC) [5,6], and address solving and redirection to appropriate routers [7].

    IPv6 has existed for 16 years, and most organizations have begun transitioning from IPv4 to IPv6.However, though some organizations have moved to IPv6, many have yet to start their transition [8].This delay is due to several reasons, one of which is related to IPv6 security [9–11].NDP internal working mechanisms were developed with the expectation that nodes would be linked with other trusted nodes.However, these assumptions were not observed in real-time implementation [12].Airports, coffee shops, and other places with a wireless environment are not secure, and anyone can join and threaten the link easily.Owing to this lack of security, the NDP is vulnerable to denial of service (DoS) attacks, which may cause devices to crash [13–16].The NDP can experience various attacks, such as neighbor advertisements, neighbor solicitations,and numerous frequently occurring threats owing to the trusted assumption of NDP internal working mechanisms.For instance, the duplicate address detection (DAD) attack is a common NDP problem [17,18] owing to the mandatory usage of an address duplication procedure while the NDP configures itself using a SLACC process [19,20].Such attacks are a threat to many sectors, such as banking and e-commerce, where recovery costs for devices and network operations are considerable.To deal with NDP security issues, the Internet Engineering Task Force(IETF) proposed an updated version of the NDP called the secure neighbor discovery (SEND)protocol [21,22].The role of the SEND protocol is to ensure address ownership validity while excluding malicious attacks and router authorization procedures [23].As an updated version of the NDP, the SEND protocol contains four new features, that is, a cryptographically generated address (CGA), an RSA, two ICMPv6 messages, and a timestamp (TS) [24,25].The CGA is the core of the SEND protocol, which is designed to deter the stealing of IPv6 addresses by binding the generated address to a public key to verify address ownership.Although the CGA technique is highly effective, it remains subject to several security vulnerabilities in addition to certain performance limitations.In this study, the authors modify a standard CGA by proposing a new method for improving CGA performance and security.The need for additional IP addresses with the exponential growth of the number of devices connected to the Internet is evident.Thus,transition to IPv6 is progressing, which will soon completely replace IPv4.The main objective of this research is to highlight and address IPv6 vulnerabilities that threaten devices.

    1.1 Contribution

    The CGA technology employs an addressing technique of fixed-size addresses with the help of a cryptographic hash function for an address owner’s public key.This technique enables owners to confirm ownership of addresses by mapping between addresses and owners using a public/private key pair [26,27].The contribution of this study is threefold.(i) This study explores CGA technical specifications, deficiencies, and security vulnerabilities.(ii) This study conducts a survey regarding the researchers’proposal to improve CGA performance.(iii) This study introduces two models to improve CGA performance and security, namely, the CGA-Lighter and Locked-CGA models, respectively.

    1.2 Paper Organization

    The rest of this paper is organized as follows.Section 2 explains the CGA specifications, and Section 3 describes the CGA deficiencies along with various types of CPA attacks and solutions.Section 4 elucidates the methodology and results, and Section 5 discusses the conclusion.Finally,the limitations and future research directions are presented in Section 6.

    2 CGA Specifcations

    In networking, the use of IPv6 improves self-certified addresses with the SEND protocol.The CGA generates a standard 64-bit address with notable symbols, as shown by [26].Moreover, it can undergo self-verification without the need for a public-key infrastructure to create an IPv6 address.CGA addressing was initially proposed by [28] as a childproofing certification for mobile IPv6 and further improved by [29].In addition, [30] recommended an alternative process using the “SUVC” concept.Subsequently, [31] demonstrated the process in the real world.

    In the IPv6 address format, special semantics and several parameters are used in the interface identifier.The first parameter set is comprised of “u” and “g” bits, which are located in the seventh and eighth bits in the interface identifier.The combination of u = g = 1 is kept unused for other purposes, which can be used in the CGA, as suggested in [31].The other value in the interface identifier is the security parameter “sec,” which is a 3-bit user-defined parameter.In a CGA, this parameter is used in relation to a hash extension, which is an essential notation used in CGA generation, as presented in Tab.1.

    Table 1:Notations CGA generation

    The CGA uses a hash extension method, which is empowered by the sec security parameter.This method includes a linear hash extension by enforcing several 16-sec bits to zero, which is referred to as Hash2.Its main purpose is to improve CGA security.To generate addresses,a computer must fulfill a number of parameters, such as the hash extension, which could slow the process of address creation if used with a big sec value.

    2.1 Creation of Addresses

    The following are the steps to produce an IPv6 address that uses CGA [32]:

    a.To adjust the modifier randomly to a 128-bit value, select the security value and initialize the collision counter.

    b.Add the modifier with 64 + 8 zero bits and the present public-key.Then, run the hash algorithm on these joined character strings.The outcome is Hash2 with 112 bits on the far-left.

    c.The 16_sec bits have to be matched with the bits on the far-left with zero.If all are zero,proceed to Step D.Otherwise, increment the modifier and return to Step B.

    d.Add the modifier with subnet notation, present public-key, and count of collisions.Then,run this modifier with the hash algorithm on these joined character strings.The outcome is Hash1 with 64 bits on the far-left side.

    e.The two special bits,i.e.,u and g, are preset to obtain an identifier for an interface on Hash1 to 1 and 3 bits on the far-left to sec-6.A 128-bit IPv6 address is obtained by adding the subnet notation and interface identifier.

    f.In a scenario where the IP address has conflict with machines in the same subnetwork,increment the count of collisions and return to Step E.This process avoids three initial conflicts.If it still exists, it halts the process and forwards the error.

    2.2 Authentication of Addresses

    a.Check and confirm whether the conflict counter is 0.If it is 1 or 2 and the subnet notation is also the same, then CGA authentication automatically becomes unsuccessful.

    b.Add the modifier with the subnet notation, the conflict count, and public-key.Then, run the H algorithm on the combined character strings.The outcome is Hash1 with 64 bits on the far-left.

    c.The Hash1 to the address interface identifier is to be equated.

    d.Alter the two special bits, u and g.The initial 3 bits on the left side are overlooked.In this scenario, the 64-bit values contrast, and the CGA authentication automatically becomes unsuccessful.

    e.Add the modifier with 64 + 8 zero bits and preset public-key.Then, run the H algorithm on these combined character strings.The outcome is Hash2 with 112 bits on the left side.

    f.The security feature is obtained by the sec 3-bit on the leftmost side of the address interface identifier.Then, equate 0 with 16_sec bits on the left side of Hash2.If the bits are not zero, the CGA authentication will be unsuccessful.Otherwise, the verification will be successful if sec=0 verification never fails at this step.Fig.1 illustrates the CGA creation and authentication process [33].

    Figure 1:CGA creation and authentication process

    3 CGA Defciencies

    The CGA security technique is quite promising in the IPv6 protocol.Nevertheless, it still has some limitations and disadvantages.One of the limitations is that CGA generates addresses with relatively higher computational time [26,34].Moreover, although CGA provides security to IPv6, it is still vulnerable to threats, and it is not a complete solution for NDP security [27].For instance,CGA does not assure that the address provided is for a node.Attackers use this drawback by compromising a new and valid CGA address, which is created with its own public key.This new address also captures the messages of Neighbor Discovery (ND) by which attackers can alter the CGA parameters of the sender.This limitation is causing failure in the CGA verification process at the receiver’s end.Thus, the communication between the sender and the receiver becomes insecure.A DAD DoS Attack can be conducted by an attacker in various ways, For instance, it disallows a new node from joining the link.The attackers can also use the techniques wherein the CGA parameters and signatures are copied and issued with a Neighbor Advertisement (NA)message, which contains similar security parameters.Through this process, the attackers prevent the CGA address for all nodes from being configured and from being attached to a local link.In another example, attackers continue the verification process.This action ensures that the node is always busy verifying valid and invalid messages of CGA.

    The time required to accomplish the Hash2 demand is stated in Tab.2 [35] and the outcome performance is matched [36].The table shows that effective addressing is impossible with an increase in safety parameter sec.

    Table 2:CGA generation time for different sec values

    3.1 CGA Attacks

    In this section, we discuss various attacks, such as (1) discovery of an alternative key pair hashing of a victim’s node address, (2) detection of a victim node’s private key, (3) a global time/memory tradeoff (TMTO) attack, (4) DoS attacks against the CGA verification process,and (5) CGA privacy implication.Attackers use the aforementioned methods to compromise the security of the CGA node [37].

    3.1.1 Discovery of an Alternative Key Pair Hashing of a Victim’s Node Address(Second Preimage Attacks)

    In such attacks, an attacker discovers a victim’s alternative key pair hashing address, and the success of the attack may depend on the hash function security properties.That is, an attacker will attempt to break the preimage hash function resistance.According to the RFC 3972 CGA standards, this is vulnerable to collision attacks when used in SHA-1 [38].RFC 4982 is used to analyze the implications of attacks for the hash function and to propose implementation supporting multiple hash algorithms.

    3.1.2 Detection of a Victim Node’s Private Key

    In this case, an attacker uses a private key in lieu of a public key, copies the CGA, and forges its signature.

    3.1.3 Global TMTO Attacks

    A CGA is extremely vulnerable to global TMTO attacks, as shown in [27].In such attacks,an attacker performs a search for hash collisions or a match to numerous addresses using the interface IDs of its public key(s) created from an extensive precomputed database.

    3.1.4 DoS Attacks Against the CGA Verification Process

    In the CGA verification process, DoS attacks can be executed in specific steps against the DAD and verification of CGA parameters [14].

    a)DoS Attacks Against DAD-CGA

    According to RFC 3756, IPv6 is highly susceptible to DoS attacks in the DAD algorithm.When DAD is applied to a tentative address by a victim’s node, in a reply, an attacker will respond as if the address is in use.As a result, the victim will not be able to configure itself and join a network.

    b)DoS Attacks by Replaying the Sender CGA Parameters

    A CGA is susceptible to repeated attacks when an attacker tries to steal and store a victim’s node messages.Moreover, an attacker can repeat attacks by using a sender’s CGA parameters.Generally, this process calculates the Hash1 required by a CGA-enabled receiver, which involves the verification of a sender’s interface ID.This verification is required to send the CGA parameters from a sender to a receiver.If a modification is executed for the CGA parameters by an attacker, then Hash1 will fail.If failure exceeds more than two, then the verification process will fail.Thus, it will interrupt the attacker communication between a CGA-enabled sender and receiver.

    c)DoS Attacks to Kill a CGA Node

    An attacker can keep a node busy with the verification process and send high-frequency signed valid or invalid CGA messages across a network.This technique is a type of DoS attack applied to the request–response protocol and not specific to CGAs.

    3.1.5 CGA Privacy Implication

    CGA generation requires high computational complexity.If an acceptable CGA is generated once, then it will be continuously used in the subnet, thereby becoming highly susceptible to privacy-related attacks.Utilization of the same address repeatedly over a long period of time increases threats, and an attacker can track and violate a user’s online privacy in devices such as cellphones, laptops, and so on.

    3.2 Solutions

    To develop and enhance CGA, the authors in [39] have proposed an approach that detects the processors automatically on a machine and generates the number of equivalent working threads to calculate the Hash2 condition.In all the cores, the computation of CGA is implemented by assigning a parallel mechanism.In general, when one condition of CGA Hash2 thread is satisfied,the other will stop.In the identical approach, the speedup time will also increase if the number of cores in the computing devices increases.In [40], the CGA mechanism proposed requires less than 10 modular multiplications.This mechanism accomplishes pickup executions through two steps.(1) It selects the productive signature scheme with little variation in the Feige–Fiat–Shamir scheme.(2) Then, the crypto parameters scheme of the signature are tuned to secure the CGA quality.The only concern in this approach is that it calls for additional fitting assets (processors),which influence and restrict the abilities of devices, node versatility, and adversely.

    The enhanced version of the protocol of CGA is known as CGA++ [41].This protocol enhances the general security, and many attacks related to CGA are disposed.Initially, the alteration is made by considering the subnet prefixes of Hash2 calculations that could avoid the attacks.The verifier not only checks the link-local addresses but also verifies full IPv6 addresses.In [42], the utilization expansions and upgrades are also suggested to verify CGA in the annihilation of the DAD algorithm against the DoS attack.The TS used is additionally proposed as CGA inside option when it runs single.In addition, it is not considered a part of SEND.This CGA is affected more by privacy-related attacks and can be resolved by tagging a CGA address for a lifetime.In this case, a tradeoff in the method occurs, and this arrangement between privacy and security is practical.In [43], the standard CGA is suggested with few alterations.It is proposed because it is mostly used to generate CGA.The running time of the upper bound of CGA is taken as input in the adjusted CGA generated algorithm, and revoking brute force is resolved by the yield of the sec value.The running time of the Hash2 value is changed in this altered CGA.This proposed algorithm is called Time-based CGA (TB-CGA).

    Enhanced CGA [44] is presented as Elliptic Curve Cryptography (ECC) and Elliptic Curve DSA (ECDSA) in which RSA is first supplemented.Later on, it uses Graphical Processing Units (GPGPU) with general-purpose calculations.The alterations in the CGA generation method thus provide permission to the connected node that recently joined the link to generate the CGA address rapidly [45].The processing is included in the CGA method ahead of time to perform the key-pair server node operation.The generation time decreases gradually as lengthy and time-consuming computation is performed on a server.This proposed method shows better performance.However, it relies more on an external server.If different server nodes are attacked,then the new nodes will not be able to join the network.To improve the computational speed of CGA, a parallelized CGA generation process is used with available resources in a trusted server [46].It is also focused on malicious nodes on overload that influence the existing network.Here, trusted management is used, which is capable of finding and isolating the malicious nodes to remove possible incentive malicious behavior.Tab.3 listed below summarizes the authors’work to improve CGA.

    Table 3:CGA countermeasures summary

    4 Methodology and Result s

    This section describes the steps and methodology to derive two models that tradeoff between SEND-based CGA security and performance.The two models are the CGA-Lighter and Locked-CGA models.Two main computational programs are used to develop the two models, namely,Open Secure Sockets Layer (OpenSSL) and Waikato Environment for Knowledge Analysis(Weka).OpenSSL is utilized to implement the CGA-Lighter model and reduce CGA generation costs using a light hash function, namely, MD5.Weka is used to implement the Locked-CGA model, including various components and functions, which are explained in the succeeding section.Moreover, components of the Locked-CGA model, such as the monitor, processor, and response controller, are likewise explained.The operation stages and workflow of the Locked-CGA model during its lifespan are also illustrated.The operation stages include the CGA traffic monitoring stage, collection stage, processing stage, and response control stage.Details on how the CGA-Lighter model can improve CGA performance are presented below.

    4.1 CGA-Lighter Model

    This model aims to minimize CGA generation costs to address the deficiency of the SEND protocol.MD-5 is a message digest-designed algorithm that takes an arbitrary length message as input to output a 128-bit input message digest or fingerprint.Yielding two messages with a similar message digest or generating a message that entails a predetermined message digest may be impossible.In 32-bit machines, the MD-5 algorithm is well designed to work efficiently and rapidly.Furthermore, the MD-5 algorithm can be coded compactly, as it does not require any extra substitution tables.According to the literature [47,48], the MD-5 hash function is fast and consumes less time to hash a construct.

    Replacing the SHA-1 hash function with the MD-5 hash function in CGA generation can help reduce costs [49].Although SHA-1 is more secure than MD-5, the latter should be considered.For instance, user mobility and mobile data demands increased recently [50–52].In a mobile environment, when nodes have limited resources, using a heavy hash function to generate cryptographic addresses will limit the performance of a network and affect it negatively.The MD-5 and SHA-1 algorithms are considered secure, as no known methods have the ability to locate collisions except with brute force, which requires many years of breakthrough for one big message digest.

    Although SHA-1 is more secure than MD-5, computing a message digest with SHA-1 costs more.In terms of security issues, SHA-1 is ideal.However, when speed is the primary concern, MD-5 is ideal and adequately secure in multiple applications [48].CGA sequence generation is conducted normally in this proposed method except for the hash function construction using MD-5.

    OpenSSL is used to implement the CGA-Lighter model, which is a software library used in applications that require secure communications over computer networks against eavesdropping or need to ascertain the identity of a party at the other end.OpenSSL is used extensively in Internet web servers and the majority of websites.OpenSSL contains SSL open-source implementation and transport layer security (TLS) protocols.The core library, which is written in the C programming language, implements essential cryptographic functions and provides various utility functions.Wrappers allowing the use of the OpenSSL library in various computer languages are available.Versions are available for most Unix and Unix-like operating systems (including Solaris, Linux, macOS, QNX, and various open-source BSD operating systems); OpenVMS; and Microsoft Windows [53].

    4.2 Testing Scenario

    In practice, a standard CGA considers a single hash value, which computes Hash1 and Hash2 in CGA specifications as two independent one-way hash values.The second Hash2 extension increases brute-force attack costs but reflects an increase in the hash output value length required for an IPv6 address, which is written into the interface ID portion.The sec value depends mostly on the Hash2 computational complexity.The address generated against the brute-force attack is used to indicate the security level of the sec using unsigned 3-bit integer values between 0 and 7(0 being the least secure and 7 being the most secure).

    Scenarios for three different CGA sec parameter values (i.e., sec=1, sec=2, and sec=3)are implemented with five different computer specifications and processor speeds.The average of five runs with different computer specifications is collected and compared with that of a standard CGA.The scenarios are conducted for three different CGA sec security scale values with processor speeds ranging from 2.0 GHz to 3.2 GHz.Three charts for sec values 0, 1, and 2 for five rounds are presented below.In general, the three different outputs for sec values 0, 1, and 2 using five different processors demonstrate a fast generation time when the CGA-lighter model is used.Consequently, computer resources and processor cycles are saved.A comparison between the standard CGA and CGA-Lighter results is shown when the sec value is set to 0 (Fig.2),1 (Fig.3), and 2 (Fig.4), as illustrated below.

    Figure 2:Sec variable with 0

    Figure 3:Sec variable with 1

    Figure 4:Sec variable with 2

    4.3 Locked-CGA Model

    The Locked-CGA model is designed to deal with the CGA DoS attacks described below.

    4.3.1 DoS Attack Against the DAD CGA

    According to RFC 3756, IPv6 is highly vulnerable to DoS attacks in the DAD algorithm [54,55].A victim node employs the DAD algorithm with a temporary address, and a reply from an attacker saying that the address is in use is received by the node.This process is how a victim node is prevented from joining and configuring the IP address of a network.

    4.3.2 DoS Attack Against the CGA Parameters

    In such attacks, CGA vulnerability is generally high, as replies of signed messages are sniffed out and stored in a victim’s node for a later reply.A sender’s CGA parameters are used by an attacker to execute a DoS attack by replying or resending a host-enabled CGA.To verify the sender interface identifier (IID), Hash1 must calculate the CGA-enabled receiver.This verification process enables a sender to send the parameters to a receiver.Hash1 fails when the parameters are modified.This mechanism is employed between a CGA-enabled sender and receiver to prevent communication from an attacker.

    The Locked-CGA model is developed by utilizing an artificial neural network (ANN) and backpropagation algorithm in the Weka 3.8 suite.Fig.5 describes the main components of the Locked-CGA model, and the functions of the model are described in Tab.4.The data structure of the Locked-CGA model is explained in Tab.5.

    Figure 5:Locked-CGA components

    Weka is used to implement this model, which is a machine learning software suite written in Java developed at the University of Waikato, New Zealand.Weka contains a collection of visualization tools and algorithms for data analysis and predictive modeling, with graphical user interfaces for easy access.Two sets, that is, a training set and test set, are used for the multilayer perceptron (MLP) neural network training in Weka.

    a.Training set:A set of examples used for learning that is to fit the parameters [i.e., weights]of the classifier.

    b.Test set:A set of examples used only to assess the performance [generalization] of a fullyspecified classifier.

    Table 4:Functions of locked-CGA components

    Table 5:Locked-CGA data structure

    Back Propagation algorithm is used for the network training.The initialization of all weights to small random numbers is done until satisfied DO conditions [56] in this algorithm occurred.For each training example DO

    a.Input the training example to the network and compute the training outputs

    b.For each output unit k

    c.For each hidden unit h

    d.Update each network weight

    4.3.3 Testing ScenariosFor the Locked-CGA model, two testing scenarios, namely, C1 (CGA parameter DoS attack)and C2 (CGA DAD DoS attack), are implemented using Weka.For scenario C1, a CGA parameter DoS attack is executed between CGA parties during the CGA verification procedure.The recorded performance metric for this scenario is the verification procedure time.For scenario C2,a CGA DAD DoS attack is executed between CGA parties’verifier and neighbor nodes.Attacker detection is based on two parameters, that is, the frame TS and IID.The controller of the Locked-CGA model takes a decision based on the gained values of this parameter and compares it with existing ANN rules.Tab.5 presents the notations for the Locked-CGA model along with the meaning and length.

    Figs.6 and 7 show the pseudocode of the algorithms used to defend against the CGA DAD DoS attack and CGA parameter DoS attack, respectively.For the Locked-CGA pseudocode, four variables, namely, the IID, TS, network synchronized time (T), and IID table (IIDt), are traced during the verification stage of the CGA algorithm.The algorithm checks whenever a SENDbased NA message arrives from a neighbor claiming that the solicited CGA address is in use during the DAD procedure.If the time difference between the TS and T of that packet is less than five seconds and the address of the NA IID exists in the IIDt, then the sender of that NA message will be classified as an attacker, and the CGA verifier will configure the claimed address as its own.The IPv6 self-configuration address includes the newly joined SEND-based node in the DAD procedure, which typically takes at least three to four seconds, thereby indicating that it is being investigated [57] by the testbeds.This investigation is why five seconds is chosen as the threshold.If the aforementioned conditions are not met, then only the DAD counter CC of the CGA verification will be completed, as it is delayed in the last part of the CGA verification algorithm rather than at the beginning, similar to a standard algorithm.

    Figure 6:Locked-CGA algorithm (CGA DAD DoS attack)

    Figure 7:Locked-CGA algorithm (CGA parameters DoS attack)

    The most common IID performance metrics are false positive rates and detection accuracy rates.A low percentage of false positive and false negative rates indicate that the detection mechanism is accurate and trusted.To evaluate and verify the CGA-Locked model, we select a detection accuracy ratio metric that represents the percentage of success in detecting the aforementioned CGA DoS attack.

    A counter variable (c) is traced whenever the CGA verification algorithm begins between two CGA parties.A two-second difference threshold is chosen, because the CGA verification time when the RSA key length is 1024 and the scaling factor sec is 0 or 1 is less than one second in a moderate Pentium processor with a speed of 2.4 Mh [58].Moreover, two seconds is a reasonable threshold, considering limited processor speeds and other RSA key lengths.

    The results of scenarios C1 and C2 are compared with the outcome of the standard CGA verification algorithm under the same attacks.The Locked-CGA model demonstrates superior security when implemented.The results of the C1 scenario under the CGA DAD DoS attack are shown in Fig.8.The figure shows that after a five-second running attack, the DoS attack is identified, and the CGA verification stops.In the C2 scenario, the Locked-GA model sufficiently manages to eliminate the verification parameter DoS attack, as shown in Fig.9.Once an attacker reaches the nonlegitimate node behavior threshold, the Locked-CGA model ignores the DAD replies from a specific IID.

    Figure 8:Results of C1 scenario

    Figure 9:Results of C2 scenario

    4.4 Summary

    The proposed CGA-Lighter and Locked-CGA model have increased the performance of IPv6 protocol security issues.Both models have the potential to balance between the security and performance of SEND-based CGA successfully for the following reasons.First, CGA parameters respond to DoS attacks, and CGA-DAD DoS attacks have become detectable and easy to recognize.Second, the primary drawback of SEND-based CGA has been solved; it became lighter and more compatible for constrained devices with limited resources and specifications.Third, a security metric, such as the detection accuracy rate, is examined in this research to check the efficiency of the second model (Locked-CGA) to detect SEND-based CGA DoS attacks.

    5 Conclusion

    In this study, we proposed two new CGA models, namely, CGA-Lighter and Locked-CGA.Given the security issues in the present model, this new model was projected to balance the security and performance of SEND-based CGA and IPv6 NDP.The generation times (computation complexity) of CGA for three different sec values were investigated to verify the efficiency of the first proposed model (CGA- Lighter).In these testing scenarios, the model was tested in five runs with five different machine specifications.For network security, the performance metric was tested in two scenarios, namely, for verification time and performance metrics.These metrics were selected because they are affected by the operations of the IPv6 network.We conclude that the performance of CGA is improved.Moreover, the consumption of resources is reduced, and CGA is more secured from the time against DoS attacks, as it uses packet TS and senders IID.

    6 Limitations and Future Works

    The Locked-CGA is limited by a legitimated node that may not cut off the threshold and become blocked.This limitation increases the possibility of obtaining false-positive rates.According to DAD internal mechanism and programming, this situation rarely occurs because once the node has passed the DAD check, it will not change the obtained address until it is rebooted again.Furthermore, the addition of TS in the CGA verification may increase network bandwidth consumption.However, this amount of consumption is also not considered a serious drawback,as verification is not frequently performed within a communication link and the bandwidth within a local link is always not an issue.

    The need for more IP addresses has increased with the growth of connected devices to the Internet and the prevalence of the Internet of Things (IoT) [59,60].Moreover MobileAd hocNetworks (MANETs) necessitate the deployment of IPv6 [61,62].Therefore, further work is needed to address the rest of the CGA attacks and safely migrate the Internet to a native IPv6 infrastructure.The proposed work has demonstrated a new method to defend two attacks of CGA.However, subsequent attacks have not been covered.Therefore, this subject could be addressed in future works.

    a.Global Time-Memory Trade-off Attack.

    b.Alternate key pair Hashing is discovered of the victim’s Node Address.

    c.A private key identification of the victim node.

    Acknowledgement:The authors would like to acknowledge the support of Network Communication Technology (NCT) Research Groups, FTSM, UKM in providing facilities for this research.This paper is supported under the Dana Impak Perdana UKM DIP-2018-040 and Fundamental Research Grant Scheme FRGS/1/2018/TK04/UKM/02/7.

    Funding Statement:This work is supported by Dana Impak Perdana fund, no.UKM DIP-2018-040 and Fundamental Research Grant Scheme fund no FRGS/1/2018/TK04/UKM/02/7 under Author R.Hassan.

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲四区av| 男女下面进入的视频免费午夜| 日韩av在线免费看完整版不卡| 人体艺术视频欧美日本| 亚洲综合色惰| 天天躁日日操中文字幕| 色视频www国产| 久久久a久久爽久久v久久| 看十八女毛片水多多多| 街头女战士在线观看网站| 国产一区亚洲一区在线观看| 欧美成人a在线观看| 性色av一级| 午夜视频国产福利| 久久久亚洲精品成人影院| 大码成人一级视频| 国产亚洲av嫩草精品影院| 内地一区二区视频在线| 夫妻性生交免费视频一级片| 免费av毛片视频| 午夜福利视频精品| 高清在线视频一区二区三区| 九九在线视频观看精品| 亚洲一级一片aⅴ在线观看| 久久97久久精品| 国产精品一二三区在线看| 亚洲精品视频女| 99久久精品国产国产毛片| 99久国产av精品国产电影| 黄色视频在线播放观看不卡| 亚洲精品成人av观看孕妇| 特大巨黑吊av在线直播| 美女被艹到高潮喷水动态| kizo精华| 熟女av电影| 看免费成人av毛片| 午夜福利在线观看免费完整高清在| 成人毛片a级毛片在线播放| 国产亚洲5aaaaa淫片| eeuss影院久久| 免费电影在线观看免费观看| 久久影院123| 国产亚洲精品久久久com| 一本一本综合久久| 一级毛片aaaaaa免费看小| 99精国产麻豆久久婷婷| 最近最新中文字幕免费大全7| 最近最新中文字幕免费大全7| 亚洲婷婷狠狠爱综合网| 少妇 在线观看| 在线观看人妻少妇| 欧美精品一区二区大全| 亚洲最大成人av| 国产美女午夜福利| 日韩成人伦理影院| 亚洲欧美精品专区久久| 亚洲色图综合在线观看| 欧美 日韩 精品 国产| 亚洲无线观看免费| 婷婷色综合大香蕉| 亚洲高清免费不卡视频| 在线观看一区二区三区激情| 日韩一本色道免费dvd| 麻豆国产97在线/欧美| 日韩亚洲欧美综合| 亚洲人成网站在线观看播放| 欧美精品一区二区大全| 日日撸夜夜添| 日韩强制内射视频| 国产精品久久久久久av不卡| 国产综合懂色| 天堂中文最新版在线下载 | 中国三级夫妇交换| 亚洲四区av| 国产色婷婷99| 日日啪夜夜撸| 欧美zozozo另类| 欧美日韩亚洲高清精品| .国产精品久久| 一区二区av电影网| 亚洲最大成人手机在线| 亚洲人成网站在线观看播放| 久久精品国产自在天天线| 一区二区三区四区激情视频| 中文字幕制服av| 精品酒店卫生间| 视频区图区小说| 男男h啪啪无遮挡| 内地一区二区视频在线| 1000部很黄的大片| 听说在线观看完整版免费高清| 人妻系列 视频| 日日摸夜夜添夜夜添av毛片| 精华霜和精华液先用哪个| 国产高清有码在线观看视频| 亚洲天堂国产精品一区在线| 夫妻性生交免费视频一级片| 99久久中文字幕三级久久日本| 亚洲综合精品二区| 成年女人在线观看亚洲视频 | 国产视频内射| 国产毛片a区久久久久| 日韩精品有码人妻一区| 久久国内精品自在自线图片| 国产午夜精品一二区理论片| 亚洲天堂av无毛| 久久6这里有精品| 亚洲久久久久久中文字幕| 最近中文字幕2019免费版| 一本色道久久久久久精品综合| 国产老妇伦熟女老妇高清| 秋霞伦理黄片| 亚洲欧美日韩无卡精品| 插阴视频在线观看视频| 精品久久久久久久人妻蜜臀av| 久久久午夜欧美精品| 听说在线观看完整版免费高清| 成人二区视频| 大香蕉久久网| 国产亚洲91精品色在线| 色视频www国产| www.av在线官网国产| 国产精品秋霞免费鲁丝片| 欧美成人一区二区免费高清观看| 午夜精品一区二区三区免费看| 久久久久久九九精品二区国产| 我要看日韩黄色一级片| 狠狠精品人妻久久久久久综合| 亚洲av二区三区四区| 一级毛片 在线播放| 中文乱码字字幕精品一区二区三区| 少妇的逼水好多| 2021天堂中文幕一二区在线观| 超碰av人人做人人爽久久| 欧美极品一区二区三区四区| 国产成人精品久久久久久| 久久久久久久午夜电影| 香蕉精品网在线| 白带黄色成豆腐渣| 国产国拍精品亚洲av在线观看| 久久久久国产精品人妻一区二区| 精品酒店卫生间| 97超视频在线观看视频| 下体分泌物呈黄色| 国产毛片在线视频| 一级毛片 在线播放| 国产人妻一区二区三区在| 免费av观看视频| 97人妻精品一区二区三区麻豆| 成人无遮挡网站| 成人综合一区亚洲| 黄片wwwwww| 日韩欧美精品免费久久| 免费av观看视频| 在线观看一区二区三区| 成人漫画全彩无遮挡| 97精品久久久久久久久久精品| 国产精品一二三区在线看| 亚洲av成人精品一区久久| 少妇高潮的动态图| 神马国产精品三级电影在线观看| 亚洲精品乱久久久久久| 一区二区三区四区激情视频| 韩国av在线不卡| 在线观看一区二区三区激情| 国产白丝娇喘喷水9色精品| 一区二区三区精品91| 亚洲精品乱久久久久久| 大片免费播放器 马上看| 晚上一个人看的免费电影| 男女无遮挡免费网站观看| 国产精品.久久久| 亚洲自拍偷在线| 国产精品女同一区二区软件| 在线看a的网站| 亚洲精品日韩在线中文字幕| 精品一区二区免费观看| 男人舔奶头视频| 精品一区二区免费观看| 日韩精品有码人妻一区| av在线天堂中文字幕| 久久久久网色| 国产日韩欧美亚洲二区| 欧美+日韩+精品| 亚洲激情五月婷婷啪啪| 各种免费的搞黄视频| 少妇猛男粗大的猛烈进出视频 | 欧美日韩综合久久久久久| 久久久久精品久久久久真实原创| 97精品久久久久久久久久精品| 国产成人精品福利久久| 一级毛片电影观看| videos熟女内射| 肉色欧美久久久久久久蜜桃 | www.av在线官网国产| 国产精品人妻久久久影院| 午夜激情福利司机影院| 插逼视频在线观看| 日本av手机在线免费观看| 极品少妇高潮喷水抽搐| 中文欧美无线码| 欧美xxxx黑人xx丫x性爽| 成人一区二区视频在线观看| 国产成人91sexporn| 国产美女午夜福利| 欧美日韩综合久久久久久| 噜噜噜噜噜久久久久久91| 成年av动漫网址| 夫妻午夜视频| 97在线人人人人妻| 日本与韩国留学比较| av国产久精品久网站免费入址| 少妇的逼水好多| 国产伦精品一区二区三区视频9| 男人爽女人下面视频在线观看| 日韩国内少妇激情av| 中文精品一卡2卡3卡4更新| 干丝袜人妻中文字幕| 人体艺术视频欧美日本| 亚洲,一卡二卡三卡| 在线观看一区二区三区激情| 国产精品秋霞免费鲁丝片| 久久久久国产精品人妻一区二区| 美女脱内裤让男人舔精品视频| 国产精品爽爽va在线观看网站| 内地一区二区视频在线| 亚洲欧美日韩无卡精品| 亚洲精品第二区| 欧美日韩综合久久久久久| 嫩草影院精品99| 久久精品国产a三级三级三级| 亚洲av国产av综合av卡| 国产亚洲精品久久久com| 精品少妇黑人巨大在线播放| 激情五月婷婷亚洲| 日本一本二区三区精品| 国内揄拍国产精品人妻在线| 天堂俺去俺来也www色官网| 熟女电影av网| av卡一久久| 美女被艹到高潮喷水动态| 亚洲欧洲国产日韩| 天堂俺去俺来也www色官网| 亚洲欧美一区二区三区黑人 | 97在线视频观看| av线在线观看网站| 街头女战士在线观看网站| 国内精品宾馆在线| 欧美日韩综合久久久久久| 久久综合国产亚洲精品| 可以在线观看毛片的网站| 26uuu在线亚洲综合色| 亚洲欧美中文字幕日韩二区| 九九在线视频观看精品| 午夜福利视频精品| 成人高潮视频无遮挡免费网站| 啦啦啦在线观看免费高清www| 蜜桃亚洲精品一区二区三区| 亚洲av国产av综合av卡| 黄色视频在线播放观看不卡| 国产免费福利视频在线观看| 亚洲婷婷狠狠爱综合网| 国产成人freesex在线| 日本猛色少妇xxxxx猛交久久| 国产在线一区二区三区精| 日本与韩国留学比较| 国产老妇伦熟女老妇高清| h日本视频在线播放| 亚洲精品国产成人久久av| 新久久久久国产一级毛片| 亚洲熟女精品中文字幕| 麻豆乱淫一区二区| 永久免费av网站大全| 国产成人a∨麻豆精品| 熟女av电影| 大片电影免费在线观看免费| av在线app专区| 91aial.com中文字幕在线观看| 久久久久精品性色| 欧美日韩一区二区视频在线观看视频在线 | 激情五月婷婷亚洲| 国产淫语在线视频| 18禁裸乳无遮挡动漫免费视频 | 亚洲一级一片aⅴ在线观看| 特大巨黑吊av在线直播| 免费高清在线观看视频在线观看| 午夜激情福利司机影院| 天天躁夜夜躁狠狠久久av| 亚洲va在线va天堂va国产| 一个人看视频在线观看www免费| 久久精品综合一区二区三区| 亚洲人成网站高清观看| 亚洲一级一片aⅴ在线观看| 久久久久久久国产电影| 欧美日韩视频精品一区| 亚洲成人久久爱视频| 欧美区成人在线视频| 日本爱情动作片www.在线观看| 久久久精品免费免费高清| 七月丁香在线播放| 超碰97精品在线观看| 久久女婷五月综合色啪小说 | 精品一区二区三卡| av福利片在线观看| 成人国产麻豆网| 性插视频无遮挡在线免费观看| av线在线观看网站| 精品熟女少妇av免费看| 国产一区二区亚洲精品在线观看| 建设人人有责人人尽责人人享有的 | 国产av国产精品国产| 别揉我奶头 嗯啊视频| 身体一侧抽搐| 欧美性感艳星| 蜜桃久久精品国产亚洲av| av.在线天堂| 国产精品爽爽va在线观看网站| 国产欧美日韩一区二区三区在线 | 日韩三级伦理在线观看| 日本一本二区三区精品| 爱豆传媒免费全集在线观看| 中文字幕人妻熟人妻熟丝袜美| 天堂中文最新版在线下载 | 日韩一区二区视频免费看| 久久精品久久久久久噜噜老黄| 久久精品夜色国产| 全区人妻精品视频| av在线天堂中文字幕| 99热这里只有是精品50| 亚洲一级一片aⅴ在线观看| 水蜜桃什么品种好| 白带黄色成豆腐渣| 国产成人免费无遮挡视频| av在线亚洲专区| 综合色av麻豆| 国产精品不卡视频一区二区| 国产视频首页在线观看| 精品久久久久久久人妻蜜臀av| 啦啦啦在线观看免费高清www| 丝袜喷水一区| 亚洲av.av天堂| 日本三级黄在线观看| 精品国产乱码久久久久久小说| 免费看日本二区| 国产黄频视频在线观看| 日韩一区二区三区影片| 国产极品天堂在线| 免费在线观看成人毛片| 国产黄色免费在线视频| 国产精品一二三区在线看| 亚洲av中文av极速乱| 亚洲欧美一区二区三区国产| av在线蜜桃| 男人和女人高潮做爰伦理| 国产老妇女一区| 性插视频无遮挡在线免费观看| 精品酒店卫生间| 天美传媒精品一区二区| 一个人看视频在线观看www免费| 一级毛片久久久久久久久女| 99re6热这里在线精品视频| 舔av片在线| 赤兔流量卡办理| 好男人在线观看高清免费视频| 国产精品.久久久| 国产av国产精品国产| 日韩,欧美,国产一区二区三区| 国产精品女同一区二区软件| 国产成人freesex在线| 亚洲精品久久午夜乱码| 国产成人精品福利久久| 美女内射精品一级片tv| 人体艺术视频欧美日本| 亚洲av免费高清在线观看| 成年女人看的毛片在线观看| 婷婷色综合www| 夜夜看夜夜爽夜夜摸| 春色校园在线视频观看| 夜夜看夜夜爽夜夜摸| 日本一二三区视频观看| 国产成人精品久久久久久| 国产精品嫩草影院av在线观看| 夜夜看夜夜爽夜夜摸| 国产亚洲av嫩草精品影院| av.在线天堂| 99久国产av精品国产电影| 国产成人精品久久久久久| 亚洲av免费高清在线观看| 身体一侧抽搐| 亚洲最大成人手机在线| 2018国产大陆天天弄谢| 日本三级黄在线观看| 精品久久久久久电影网| av在线app专区| 最近最新中文字幕免费大全7| 最近最新中文字幕大全电影3| 免费不卡的大黄色大毛片视频在线观看| 国产高清三级在线| 欧美精品国产亚洲| 亚洲人成网站在线观看播放| 青青草视频在线视频观看| 国产探花极品一区二区| 69av精品久久久久久| 亚洲av二区三区四区| 欧美日韩国产mv在线观看视频 | 精品久久久久久电影网| 一级爰片在线观看| 亚洲国产欧美人成| 亚洲性久久影院| 久久人人爽av亚洲精品天堂 | 五月伊人婷婷丁香| 伊人久久国产一区二区| 亚洲一级一片aⅴ在线观看| 国产成人精品一,二区| 一级片'在线观看视频| 精品视频人人做人人爽| 我要看日韩黄色一级片| 九草在线视频观看| 18禁裸乳无遮挡免费网站照片| 国产av码专区亚洲av| 婷婷色综合www| 成人毛片60女人毛片免费| 久久久久精品性色| 日本与韩国留学比较| 香蕉精品网在线| 国内揄拍国产精品人妻在线| tube8黄色片| 国产成人福利小说| 91狼人影院| 欧美激情在线99| 色网站视频免费| 春色校园在线视频观看| 久久热精品热| 亚洲精品456在线播放app| 欧美日韩精品成人综合77777| 丝瓜视频免费看黄片| 中国三级夫妇交换| 人妻 亚洲 视频| 日韩强制内射视频| 九草在线视频观看| 禁无遮挡网站| 亚洲av中文av极速乱| 成人二区视频| 久久久久久伊人网av| 男人添女人高潮全过程视频| 久久精品综合一区二区三区| 久久精品国产亚洲av涩爱| 男男h啪啪无遮挡| av.在线天堂| 国产精品99久久99久久久不卡 | 蜜桃久久精品国产亚洲av| 亚洲av男天堂| 成人午夜精彩视频在线观看| 久久人人爽av亚洲精品天堂 | 国产精品秋霞免费鲁丝片| 日本一本二区三区精品| 噜噜噜噜噜久久久久久91| 看免费成人av毛片| 男插女下体视频免费在线播放| 久久久久久九九精品二区国产| 色视频www国产| 亚洲欧美成人综合另类久久久| tube8黄色片| 97在线视频观看| 在线精品无人区一区二区三 | 精品人妻一区二区三区麻豆| av在线播放精品| 久久人人爽av亚洲精品天堂 | 国产免费又黄又爽又色| 哪个播放器可以免费观看大片| 久久精品国产亚洲网站| 午夜福利在线在线| 欧美3d第一页| 亚洲天堂av无毛| 嘟嘟电影网在线观看| av免费观看日本| 成人二区视频| 欧美bdsm另类| 九九爱精品视频在线观看| 99久久精品热视频| 涩涩av久久男人的天堂| 我的女老师完整版在线观看| tube8黄色片| 亚洲精品乱久久久久久| 国产免费又黄又爽又色| 日本猛色少妇xxxxx猛交久久| 又黄又爽又刺激的免费视频.| 中国三级夫妇交换| 亚洲久久久久久中文字幕| eeuss影院久久| 国产精品蜜桃在线观看| 亚洲成人中文字幕在线播放| 如何舔出高潮| 草草在线视频免费看| 直男gayav资源| av免费观看日本| 精品99又大又爽又粗少妇毛片| 少妇被粗大猛烈的视频| 女的被弄到高潮叫床怎么办| 亚洲天堂av无毛| 晚上一个人看的免费电影| 亚洲欧美精品专区久久| 亚洲精品中文字幕在线视频 | 久久人人爽人人片av| 亚洲精品久久久久久婷婷小说| 少妇 在线观看| 男女边摸边吃奶| 少妇人妻精品综合一区二区| av网站免费在线观看视频| 国产 精品1| 国产爱豆传媒在线观看| a级毛色黄片| 亚洲自拍偷在线| 热re99久久精品国产66热6| 国产亚洲5aaaaa淫片| 女人被狂操c到高潮| 五月伊人婷婷丁香| 久久久久久久大尺度免费视频| 日产精品乱码卡一卡2卡三| 秋霞在线观看毛片| 街头女战士在线观看网站| 久久99热6这里只有精品| av在线观看视频网站免费| 亚洲欧美日韩另类电影网站 | 一个人看视频在线观看www免费| 18禁在线播放成人免费| 最近中文字幕高清免费大全6| 国产成人一区二区在线| 久久97久久精品| 白带黄色成豆腐渣| 好男人视频免费观看在线| 亚洲成色77777| 男插女下体视频免费在线播放| 三级国产精品欧美在线观看| 精品人妻熟女av久视频| 久久精品人妻少妇| 国产视频内射| 看非洲黑人一级黄片| 亚洲精品乱码久久久v下载方式| 日韩大片免费观看网站| 亚洲在线观看片| 精品久久久久久久久av| 熟女av电影| 欧美zozozo另类| 99视频精品全部免费 在线| 好男人在线观看高清免费视频| 国产乱人视频| 女人被狂操c到高潮| 哪个播放器可以免费观看大片| 亚洲成人久久爱视频| 日本与韩国留学比较| 美女视频免费永久观看网站| 26uuu在线亚洲综合色| 伊人久久国产一区二区| 免费电影在线观看免费观看| 中文字幕人妻熟人妻熟丝袜美| 高清日韩中文字幕在线| 一级爰片在线观看| 精品久久久久久久久av| kizo精华| 啦啦啦中文免费视频观看日本| 黄色配什么色好看| 亚洲高清免费不卡视频| 全区人妻精品视频| 亚洲精品日本国产第一区| 日韩av在线免费看完整版不卡| 日本黄色片子视频| 少妇丰满av| 国产大屁股一区二区在线视频| xxx大片免费视频| av专区在线播放| 美女xxoo啪啪120秒动态图| 久久久欧美国产精品| 久久99热这里只频精品6学生| 亚洲经典国产精华液单| 亚洲精品国产av成人精品| 边亲边吃奶的免费视频| 99热这里只有是精品在线观看| 精华霜和精华液先用哪个| 成年av动漫网址| 丰满人妻一区二区三区视频av| 国产一区有黄有色的免费视频| 在线观看美女被高潮喷水网站| 在线看a的网站| 欧美高清性xxxxhd video| 精品一区在线观看国产| 夜夜看夜夜爽夜夜摸| 欧美成人精品欧美一级黄| 大码成人一级视频| 看免费成人av毛片| 97精品久久久久久久久久精品| 99久久中文字幕三级久久日本| 国产探花极品一区二区| 精品人妻熟女av久视频| 亚洲av.av天堂| 伊人久久精品亚洲午夜| 国产美女午夜福利| 亚洲av.av天堂| 不卡视频在线观看欧美| 国产人妻一区二区三区在| 美女国产视频在线观看| 十八禁网站网址无遮挡 | 久久人人爽av亚洲精品天堂 | 久久久久久国产a免费观看| 99精国产麻豆久久婷婷| 蜜桃亚洲精品一区二区三区| 国国产精品蜜臀av免费| 久久久久久久久久人人人人人人| 建设人人有责人人尽责人人享有的 | 老司机影院毛片| 亚洲成人一二三区av| 色哟哟·www| 欧美区成人在线视频| 极品教师在线视频| 亚洲精品国产色婷婷电影|