Designing a micro-moving target ipv6 defense for the internet of things

K Zeitz, M Cantrell, R Marchany, J Tront - Proceedings of the Second …, 2017 - dl.acm.org
As the use of low-power and low-resource embedded devices continues to increase
dramatically with the introduction of new Internet of Things (IoT) devices, security techniques …

Changing the game: A micro moving target IPv6 defense for the internet of things

K Zeitz, M Cantrell, R Marchany… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
This letter explores the uses of a micro moving target IPv6 defense (μMT6D). In this initial
experiment we assess the power consumption overhead and detail the overall security …

Routing in distributed cognitive radio networks: A survey

HAA Al-Rawi, KLA Yau - Wireless Personal Communications, 2013 - Springer
Abstract Cognitive Radio Networks (CRNs) have been receiving significant research
attention recently due to their ability to solve issues associated with spectrum congestion …

A new approach for detection of host identity in IPv6 networks

L Polčák, M Holkovič… - … Conference on Data …, 2013 - ieeexplore.ieee.org
For security, management and accounting, network administrators benefit from knowledge of
IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it …

Exposing potential privacy issues with ipv6 address construction

C Carpene, A Woodward - 2012 - ro.ecu.edu.au
The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant
potential privacy issues. This paper discusses the means of allocating IPv6 addresses …

Optimizing a network layer moving target defense by translating software from python to c

OR Hardman - 2016 - vtechworks.lib.vt.edu
The security of powerful systems and large networks is often addressed through complex
defenses. While these types of defenses offer increased security, they are resource intensive …

Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses

MW Dunlop - 2012 - vtechworks.lib.vt.edu
Society's increased use of network applications, such as email, social networking, and web
browsing, creates a massive amount of information floating around in cyber space. An …

Host Identity Detection in IPv6 Networks

L Polčák, M Holkovič, P Matoušek - … 2013, Reykjavik, Iceland, July 29-31 …, 2014 - Springer
It is important to keep networks secure and reliable. In order to backtrack security incidents,
provide accounting for offered services etc., it is necessary to know the identity of network …

A survey of IPv6 address usage in the public domain name system

CR Carpene, A Woodward - 2014 - ro.ecu.edu.au
The IPv6 protocol has been slowly increasing in use on the Internet. The main reason for the
development of the protocol is that the address space provided by IPv4 is nearing …

[PDF][PDF] Challenges in identification in future computer networks

L Polčák - ICETE 2014 Doctoral Consortium, 2014 - scitepress.org
The knowledge of user identity is a necessity for many network-related tasks, eg network
management (Grégr et al., 2011), security incident backtracking (Scarfone et al., 2008) …