Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery

Author(s):  
M. F. Rabbi Ur Rashid ◽  
Chung-Homg Lung ◽  
Marc St-Hilaire ◽  
Biswajit Nandy ◽  
Nabil Seddigh
2013 ◽  
Vol 765-767 ◽  
pp. 1050-1054
Author(s):  
Jiang Du ◽  
Yu Li

Discovery of computer networks topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we dont know its interface information, which makes it very difficult to find out their interconnections through common ways. This paper introduces a solution to deal with it, using source-routing traceroute command and nodes degree to merge ARs or find out their relation, and finally get the topology graph.


2013 ◽  
Vol 24 (5) ◽  
pp. 1098-1110
Author(s):  
Yu-Xing SUN ◽  
Li XIE ◽  
Yi-Fei CHEN

2010 ◽  
Author(s):  
Bow-Nan Cheng ◽  
Randy Charland ◽  
Paul Christensen ◽  
Andrea Coyle ◽  
Edward Kuczynski ◽  
...  
Keyword(s):  

2020 ◽  
Vol 167 ◽  
pp. 106975 ◽  
Author(s):  
Cristina K. Dominicini ◽  
Gilmar L. Vassoler ◽  
Rodolfo Valentim ◽  
Rodolfo S. Villaca ◽  
Moisés R.N. Ribeiro ◽  
...  

Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


Sign in / Sign up

Export Citation Format

Share Document