The Address Resolution Protocol (ARP) is used by
computers to map logical addresses (IP) to physical addresses
(MAC). However ARP is an all trusting protocol and is stateless
which makes it vulnerable to many ARP cache poisoning attacks
such as Man-in-the-Middle (MITM) and Denial of service (DoS)
attacks. These flaws result in security breaches thus weakening the
appeal of the computer for exchange of sensitive data. In this paper
we describe ARP, outline several possible ARP cache poisoning
attacks and give the detailed of some attack scenarios in network
having both wired and wireless hosts. We have analyzed each of
proposed solutions, identify their strengths and limitations. Finally
get that no solution offers a feasible solution. Hence, this paper
presents an efficient and secure version of ARP that is able to cope
up with all these types of attacks and is also a feasible solution. It is a
stateful protocol, by storing the information of the Request frame in
the ARP cache, to reduce the chances of various types of attacks in
ARP. It is more efficient and secure by broadcasting ARP Reply
frame in the network and storing related entries in the ARP cache
each time when communication take place.
 D. Bruschi, A. Omaghi and E. Rosti, "S-ARP: a secure address
resolution protocol," in Proceedings of the 19th Annual Computer
Security Applications Conference, December 2003.
 W. Lootah, W. Enck and P. McDaniel, "TARP: Ticket-based address
resolution protocol," in Proceedings of the 21st Annual Computer
Security Applications Conference, December 2005.
 M. A. Carnut and J. C. Gondim, "ARP spoofing detection on switched
Ethernet networks: A feasibility study," in Proceedings of the 5th
Simp├│sio Seguran├ºa em Inform├ítica, November 2003.
 M. M. Dessouky, W. Elkilany, and N. Alfishawy, "A Hardware
Approach for detecting the ARP Attack," in 7th International
Conference on Informatics and Systems (INFOS), May 2010.
 S. Puangpronpitag and N. Masusai, "An Efficient and Feasible Solution
to ARP Spoof Problem," in 6th International Conference on Electrical
Engineering/Electronics, Computer, Telecommunications and
Information Technology, May 2009.
 Roney Philip, "Securing Wireless Networks from ARP Cache
Poisoning," (2007).Master's Projects. Paper 131.
 Cristina L. Abad and Rafael I. Bonilla, "An Analysis on the Schemes for
Detecting and Preventing ARP Cache Poisoning Attacks," in 27th
International Conference on Distributed Computing Systems
 M. Tripunitara and P. Dutta, "A middleware approach to asynchronous
and backward compatible detection and prevention of ARP cache
poisoning," in Proceedings of the 15th Annual Computer Security
Applications Conference, December 1999.
 Mohamed G. Gouda and Chin-Tser Huang, "A secure address resolution
protocol" in the International Journal of Computer and
Telecommunications Networking, Computer Networks, Elsevier,
Volume 41, Issue 1, pages: 57-71, January, 2003.
 B. Issac and L. A. Mohammed, "Secure Unicast Address Resolution
Protocol (S-UARP) by Extending DHCP," in 13th IEEE International
Conference on Networks, 2005. Jointly held with the IEEE 7th Malaysia
International Conference on Communication 2005.
 B. Fleck and J. Dimov, "Wireless Access Points and ARP Poisoning:
Wireless vulnerabilities that expose the wired network,".
 D. C. Plummer, "An ethernet address resolution protocol," in RFC 826,
 B. Issac, "Secure ARP and Secure DHCP Protocols to Mitigate Security
Attacks," in International Journal of Network Security, Vol.8, No.2,
PP.107-118, March, 2009.