Secure Neighbor Discovery
The Neighbor Discovery Protocol (NDP) is responsible in IPv6 for discovery of other network nodes on the local link, to determine the link layer addresses of other nodes, and to find available routers, and maintain reachability information about the paths to other active neighbor nodes (RFC 4861). NDP is insecure  and susceptible to malicious interference. It is the intent of SEND to provide an alternate mechanism for securing NDP with a cryptographic method that is independent of IPsec, the original and inherent method of securing IPv6 communications.
SEND was updated to use the Resource Public Key Infrastructure (RPKI) by RFC 6494 and RFC 6495 which define use of a SEND Certificate Profile utilizing a modified RFC 6487 RPKI Certificate Profile which must include a single RFC 3779 IP Address Delegation extension.
There have been concerns with algorithm agility vis-à-vis attacks on hash functions used by SEND expressed in RFC 6273, as CGA currently uses the SHA-1 hash algorithm and PKIX certificates and does not provide support for alternative hash algorithms.
- Cisco IOS 12.4(24)T and newer
- Docomo USL SEND fork[permanent dead link]
- ipv6-send-cga, Huawei and Beijing University of Posts and Telecommunications
- NDprotector, Telecom SudParis
- Native SeND kernel API
- USL SEND (discontinued), NTT DoCoMo
- Holding IPv6 Neighbor Discovery to a Higher Standard of Security, community.infoblox.com, 2.10.2015