

Countermeasure schemes, such as the cache table static management, S-ARP, T-ARP, and ARP Table server synchronization method, have been presented. Although various studies have addressed ARP spoofing attack detection, and presented countermeasure plans, there are numerous fundamental difficulties in finding an optimized solution. Therefore, security considerations in the ubiquitous networks are required.Īn ARP spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another. A secure network can maintain rich ubiquitous environments. Therefore, one of the important considerations in ubiquitous environments is network security. Ubiquitous environments always need connected networks. However, a growing number of security concerns in this environment have emerged at the same time. In particular, the use of smart applications has greatly increased. Ubiquitous computing has been perceived as the new paradigm for a comfortable life in recent times. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. Tracing routing can find the change of network movement path. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network.

However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. ARP is designed to work without problems in general environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. Despite the convenience, ubiquitous computing suffers from many threats and security risks.
