Fig 1.
NDP messages.
Fig 2.
DAD process in IPv6 link-local network.
Fig 3.
DoS on DAD process in IPv6 link-local network.
Table 1.
Summary of Defense Mechanisms.
Fig 4.
Plaintext combination.
Fig 5.
DADmatch option format.
Fig 6.
Workflow of DAD-match security technique.
Table 2.
Machine details.
Fig 7.
Time need for Brute-force attack.
Fig 8.
DoS attack during DAD process on Standard-DAD and DAD-match security technique.
Table 3.
DADSR comparison between DAD-match and existing mechanisms during DoS-spoofing IP address attack on DAD process.
Fig 9.
Processing time for generating NS message at the Sender node.
Fig 10.
Processing time for NA message at the Sender node.
Fig 11.
Processing time for verifying NS message at the Receiver node.
Fig 12.
Processing time for verifying NA message at the Receiver node.
Table 4.
Processing time for generating and verifying NS and NA messages.
Fig 13.
Comparative results of DAD-match security technique with other existing mechanisms in terms of total processing Time.