TY - GEN
T1 - Generating Unlinkable IPv6 Addresses
AU - Kayuni, Mwawi Nyirenda
AU - Khan, Mohammed Shafiul Alam
AU - Li, Wanpeng
AU - Mitchell, Chris J.
AU - Yau, Po-Wah
N1 - International Conference on Research in Security Standardisation
PY - 2015
Y1 - 2015
N2 - A number of approaches to the automatic generation of IPv6 addresses have been proposed with the goal of preserving the privacy of IPv6 hosts. However, existing schemes for address autoconfiguration do not adequately consider the full context in which they might be implemented, in particular the impact of low quality random number generation. This can have a fundamental impact on the privacy property of unlinkability, one of the design goals of a number of IPv6 address autoconfiguration schemes. In this paper, the potential shortcomings of previously proposed approaches to address autoconfiguration are analysed in detail, focussing on what happens when the assumption of strong randomness does not hold. Practical improvements are introduced, designed to address the identified issues by making the random generation requirements more explicit, and by incorporating measures into the schemes designed to ensure adequate randomness is used.
AB - A number of approaches to the automatic generation of IPv6 addresses have been proposed with the goal of preserving the privacy of IPv6 hosts. However, existing schemes for address autoconfiguration do not adequately consider the full context in which they might be implemented, in particular the impact of low quality random number generation. This can have a fundamental impact on the privacy property of unlinkability, one of the design goals of a number of IPv6 address autoconfiguration schemes. In this paper, the potential shortcomings of previously proposed approaches to address autoconfiguration are analysed in detail, focussing on what happens when the assumption of strong randomness does not hold. Practical improvements are introduced, designed to address the identified issues by making the random generation requirements more explicit, and by incorporating measures into the schemes designed to ensure adequate randomness is used.
UR - https://link.springer.com/chapter/10.1007/978-3-319-27152-1_10
U2 - 10.1007/978-3-319-27152-1_10
DO - 10.1007/978-3-319-27152-1_10
M3 - Published conference contribution
SN - 978-3-319-27151-4
T3 - Lecture Notes in Computer Science
SP - 185
EP - 199
BT - Security Standardisation Research. SSR 2015
A2 - Chen, L
A2 - Matsuo, S
PB - Springer
ER -