Index First page Back Continue Last page Graphics
How to secure ND (cont.)
One of major threats: address spoofing attacks
How to authenticate NA?
Cryptography is our friend!
Symmetric: key protection is an issue
Asymmetric:
- key distribution is an issue.
- how to authenticate the peer?