1 |
Plummer D C . An ethernet address resolution protocol. , http://tools.ietf.org/html/rfc826, 1982
|
2 |
Narten T , Nordmark E , Simpson W , et al. Neighbor discovery for IP version 6(IPv6). , http://tools.IETF.org/html/rfc4861, 2007
|
3 |
Gao J H , Xia K J . ARP spoofing detection algorithm using ICMP protocol. Proceedings of the IEEE International Conference on Computer Communication and Informatics, Coimbatore, India, 2013: 1~6
|
4 |
Wang X L , Zhou G . Defence design for ARP spoofing based on NDIS intermediate driver. Proceedings of the IEEE International Conference on Computer Distributed Control and Intelligent Environmental Monitoring, Changsha, China, 2012: 218~220
|
5 |
Pandey P . Prevention of ARP spoofing: a probe packet based technique. Proceedings of the IEEE International Advance Computing Conference, Ghaziabad, India, 2013: 147~153
|
6 |
Thomson S , Narten T , Jinmei T . IPv6 stateless address auto configuration. , http://tools.IETF.org/html/rfc4862, 2007
|
7 |
Nikander P , Kempf J , Nordmark E . IPv6 neighbor discovery (ND) trust models and threats. , http://tools.IETF.org/html/rfc3756, 2004
|
8 |
Liu C H , Dai Q G . Design of security neighbor discovery protocol. Proceedings of the IEEE International Conference on Communication Systems and Network Technologies, Gwalior, India, 2013: 538~541
|
9 |
Arkko J , Kempf J , Zill B , et al. Secure neighbor discovery (SEND). , http://tools.IETF.org/html/rfc3971, 2005
|
10 |
Aura J Cryptographically generated addresses (CGA). , http://tools.IETF.org/html/rfc3972, 2005
|
11 |
AlSa'deh A , Meinel C . Secure neighbor discovery: review, challenges, perspectives, and recommendations. IEEE Security &Privacy, 2012, 10(4): 26~34
|
12 |
Rafiee H , AlSa'deh A , Meinel C . Multicore-based auto-scaling secure neighbor discovery for windows operating systems. Proceedings of the IEEE International Conference on Information Networking, Bali, 2012: 269~274
|
13 |
Alsaˊdeh A , Feng C , Meinel C . CS-CGA: compact and more secure CGA. Proceedings of the IEEE International Conference on Networks, Singapore, 2011: 299~304
|
14 |
Siddiqi Q S , Anwar M U . A study of CGA-(cryptographically generated address)signature based authentication of binding update messages in low-end MIPv6 node. Proceedings of the IEEE International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, 2012: 510~514
|
15 |
AlSa'deh A , Rafiee H , Meinel C . Stopping time condition for practical IPv6 cryptographically generated addresses. Proceedings of the IEEE International Conference on Information Networking, Bali, 2012: 257~262
|
16 |
Su G X , Wang W D , Gong X Y . A quick CGA generation method. Proceedings of the IEEE International Conference on Future Computer and Communication, Wuhan, China, 2010: 769~773
|
17 |
Rafiee H , AlSa'deh A , Meinel C . Winsend: windows secure neighbor discovery. Proceedings of the ACM International Conference on Security of Information and Networks, Sydney, Australia, 2011: 243~246
|
18 |
Hou Y , Wang Z X , Wang Y , et al. Routing attack in the ND and SEND mixed environment. Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, China, 2012: 959~962
|
19 |
Jinhua G , Kejian X . ARP spoofing detection algorithm using ICMP protocol. Proceedings of 2013 International Conference on Computer Communication and Informatics(ICCCI), Paris, France, 2013: 1~6
|
20 |
Pandey P , Prevention of ARP spoofing: a probe packet based technique. Proceedings of Advance Computing Conference (IACC), 2013 IEEE 3rd International, Los Angles, USA, 2013: 147~153
|