Browse > Article

Security Threats Analysis for Network-based Mobile IPv6  

Kim, Hyun-Gon (Division of Information Engineering, Mokpo National University)
Seo, Jae-Hyeon (Division of Information Engineering, Mokpo National University)
Oh, Byeong-Kyun (Division of Information Engineering, Mokpo National University)
Ahn, Tae-Nam (Security Engineering Research Center, Hannam University)
Kim, Jin-Hyung (Computer Science, KAIST)
Publication Information
Abstract
In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.
Keywords
Threats; Mobile IPv6; PMIPv6; Mobility;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Glass, T. Hiller, S. Jacobs, C. Perkins, 'Mobile IP Authentication, Authorization, and Accounting Requirements', RFC2977, October 2000
2 김현곤 외 6명, 'AAA 정보보호 기술 표준화 동향', 전자통신동향분석, 제20권 제1호, 2005년 2월
3 신명기, 김형준, 'IPv6 전환 환경에서의 보안 기술분석', 전자통신동향 분석, 제21권 제5호, pp.163-170, 2006년 10월
4 Nikander, P., Kempf, J., and E. Nordmark, 'IPv6 Neighbor Discovery (ND) Trust Models and Threats', RFC 3756, May 2004
5 한국정보보호진흥원, 'IPv6 보안 기술 해설서', 2005년 10월
6 Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., Liebsch, M., 'Problem Statement for Network-based Localized Mobility Management', RFC4830, September 2006
7 D. Johnson, C. Perkins, and J.Arkko, 'Mobility Support in IPv6', RFC3755, July 2003
8 Arkko, J., Kempf, J., Zill, B., and P. Nikander, 'SEcure Neighbor Discovery(SEND)', RFC 3971, March 2005
9 C. Vogt, J. Kempf, 'Security Threats to Network-Based Localized Mobility Management (NETLMM)', RFC4832, April 2007
10 정보흥, 임재덕, 김영호, 김기영, 'IPv6 환경의 보안 위협 및 공격 분석', 전자통신동향분석, 제22권 제 1호, pp.37-50, 2007년 2월
11 CERT Coordination Center, 'CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks', September 1996
12 S. Gumdavelli, K. Leung, et al., 'Proxy Mobile IPv6', draft-ietf-netlmm-proxymipv6-01.txt, June 2007
13 Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., Liebsch, M., 'Goals for Network-based Localized Mobility Management', RFC4831, 2006.10
14 한국정보보호진흥원, '와이브로 보안기술 해설서', 2006년 8월