Jefferson Rodrigo A. Cavalcante, Alex F. R. Trajano, Lucas Leite, Miguel F. Mariano, J. Celestino, Ahmed Patel, J. Souza
{"title":"Securing IPv6 Wireless Networks Against Malicious Router Advertisements","authors":"Jefferson Rodrigo A. Cavalcante, Alex F. R. Trajano, Lucas Leite, Miguel F. Mariano, J. Celestino, Ahmed Patel, J. Souza","doi":"10.1109/PIMRC.2019.8904296","DOIUrl":null,"url":null,"abstract":"With the increasing number of devices connected to the internet and scarcity of IPv4 addresses, the IPv6 protocol was designed to address various of the limitations of IPv4 networks, supporting 128-bit addresses, deploying a fragmentation mechanism aiming better routers performance, use of multicast instead of broadcast and more. However, challenging security issues have been discovered on its design, with researches actively working to reduce the impact of cyber attacks exploring such breaches. One of these issues allows malicious IPv6 nodes to pretend they are actual gateways of a network, allowing for Denial-of-Service and Man-in-the-Middle attacks. This work proposes the Fingerprint-based Router Advertisement Guard (FibRA-Guard), a mechanism to avoid the spread of malicious Router Advertisements on wireless networks, relying on non-intrusive fingerprint authentication of sources of suspicious Router Advertisements based on the time each device takes to generate and send IPv6 packets. On a testbed with 15 devices, FibRA-Guard was able to identify sources of packets with an average accuracy of 96%, proving to be a reliable solution towards wireless IPv6 networks secured against malicious Router Advertisements.","PeriodicalId":412182,"journal":{"name":"2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","volume":"660 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRC.2019.8904296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the increasing number of devices connected to the internet and scarcity of IPv4 addresses, the IPv6 protocol was designed to address various of the limitations of IPv4 networks, supporting 128-bit addresses, deploying a fragmentation mechanism aiming better routers performance, use of multicast instead of broadcast and more. However, challenging security issues have been discovered on its design, with researches actively working to reduce the impact of cyber attacks exploring such breaches. One of these issues allows malicious IPv6 nodes to pretend they are actual gateways of a network, allowing for Denial-of-Service and Man-in-the-Middle attacks. This work proposes the Fingerprint-based Router Advertisement Guard (FibRA-Guard), a mechanism to avoid the spread of malicious Router Advertisements on wireless networks, relying on non-intrusive fingerprint authentication of sources of suspicious Router Advertisements based on the time each device takes to generate and send IPv6 packets. On a testbed with 15 devices, FibRA-Guard was able to identify sources of packets with an average accuracy of 96%, proving to be a reliable solution towards wireless IPv6 networks secured against malicious Router Advertisements.