Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.4.691

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6  

You, Il-Sun (한국성서대학교 정보과학부)
Kim, Heung-Jun (진주산업대학교 컴퓨터공학부)
Abstract
Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.
Keywords
Mobile IPv6; Enhanced Route Protocol; CGA; BAN-logic;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Trans. Computer Systems, Vol. 1, pp. 18-36, 1990   DOI
2 G. O'Shea and M. Roe, "Child-proof authentication for MIPv6 (CAM)," ACM Computer Communications Review, Vol. 31, No. 2, April, 2001
3 Ilsun You, "Improving the Kang-Park's Protocol for Securing Binding Update in MIPv6," Journal of The Institue of Electronics Enginners of Korea, Vol. 44-TC, No. 10 pp.148-155, Oct., 2007   과학기술학회마을
4 Ilsun You and Sung Kyo Choi, "An Improvement of Mobile IPv6 Binding Update Protocol Using Address Based Keys," Journal of The Institue of Electronics Enginners of Korea, Vol. 42-CI, No. 5 pp.21-30, Sep., 2005   과학기술학회마을   ScienceOn
5 T. Aura, "Cryptographically Generated Addresses (CGA)," RFC 3972, March 2005
6 J. Arkko, C. Vogt and W. Haddad, "Enhanced Route Optimization for Mobile IPv6," IETF RFC 4866, May, 2007
7 J. Li , J. Huai, Q. Li and X. Li, "Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method," Springer-Verlag LNCS, Vol. 3794, pp. 1073-1080, December, 2005
8 R. Deng, J. Zhou, and F. Bao, "Defending Against Redirect attacks in Mobile IP," Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov., 2002
9 D. Johnson, C. Perkins and J. Arkko, "Mobility Support in IPv6," IETF RFC 3775, June, 2004