Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

NDP messages.

More »

Fig 1 Expand

Fig 2.

DAD process in IPv6 link-local network.

More »

Fig 2 Expand

Fig 3.

DoS on DAD process in IPv6 link-local network.

More »

Fig 3 Expand

Table 1.

Summary of Defense Mechanisms.

More »

Table 1 Expand

Fig 4.

Plaintext combination.

More »

Fig 4 Expand

Fig 5.

DADmatch option format.

More »

Fig 5 Expand

Fig 6.

Workflow of DAD-match security technique.

More »

Fig 6 Expand

Table 2.

Machine details.

More »

Table 2 Expand

Fig 7.

Time need for Brute-force attack.

More »

Fig 7 Expand

Fig 8.

DoS attack during DAD process on Standard-DAD and DAD-match security technique.

More »

Fig 8 Expand

Table 3.

DADSR comparison between DAD-match and existing mechanisms during DoS-spoofing IP address attack on DAD process.

More »

Table 3 Expand

Fig 9.

Processing time for generating NS message at the Sender node.

More »

Fig 9 Expand

Fig 10.

Processing time for NA message at the Sender node.

More »

Fig 10 Expand

Fig 11.

Processing time for verifying NS message at the Receiver node.

More »

Fig 11 Expand

Fig 12.

Processing time for verifying NA message at the Receiver node.

More »

Fig 12 Expand

Table 4.

Processing time for generating and verifying NS and NA messages.

More »

Table 4 Expand

Fig 13.

Comparative results of DAD-match security technique with other existing mechanisms in terms of total processing Time.

More »

Fig 13 Expand