Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.3.121

State of Art on Security Protocols for Fast Mobile IPv6  

You, Il-Sun (Korean Bible University)
Hori, Yoshiaki (Kyushu University)
Sakurai, Kouichi (Kyushu University)
Abstract
With the help of various Layer 2 triggers, Fast Handover for Mobile IPv6 (FMIPv6) considerably reduces the latency and the signaling messages incurred by the handover. Obviously, if not secured, the protocol is exposed to various security threats and attacks. In order to protect FMIPv6, several security protocols have been proposed. To our best knowledge, there is lack of analysis and comparison study on them though the security in FMIPv6 is recognized to be important. Motivated by this, we provide an overview of the security protocols for FMIPv6, followed by the comparison analysis on them. Also, the security threats and requirements are outlined before the protocols are explored. The comparison analysis result shows that the protocol presented by You, Sakurai and Hori is more secure than others while not resulting in high computation overhead. Finally, we introduce Proxy MIPv6 and its fast handover enhancements, then emphasizing the need for a proper security mechanism for them as a future work.
Keywords
FMIPv6 Security; SEND; AAA; CCA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 V. Narayanan, N. Venkitaraman, H. Tschofenig, G. Giaretta, and J. Bournelle, "Establishing Handover Keys using Shared Keys," IETF Internet Draft, draft-vidya-mipshop-handover-keys-aaa-04, March 2007
2 H. Yokota, K. Chowdhury, R. Koodli, B. Patil, and F. Xia, "Fast Handovers for Proxy Mobile IPv6," IETF Internet Draft, draft-ietf-mipshop-pfmipv6-12, Dec. 2009.
3 Y. Han and B. Park. "A Fast Handover Scheme in Proxy Mobile IPv6," IETF Internet Draft, draft-han-netlmm-fast-pmipv6-00, July 2008.
4 C. Vogt and J. Kempf, "Security Threats to Network-Based Localized Mobility Management (NETLMM)," IETF RFC 4832, Apr. 2007
5 D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6," IETF RFC 3775, June 2004
6 R. Koodli, "Mobile IPv6 Fast Handovers," IETF RFC 5268, June 2008
7 H. Soliman, C. Castelluccia, K. ElMalki, and L. Bellier, "Hierarchical Mobile IPv6 (HMIPv6) Mobility Management," IETF RFC 5380, Oct. 2008
8 J. Arkko, C. Vogt, and W. Haddad, "Enhanced Route Optimization for Mobile IPv6," IETF RFC 4866, May 2007
9 R.H. Deng, J. Zhou, and F. Bao, "Defending against redirect attacks in mobile IP," In Proc. of the 9th ACM conference on Computer and Communications Security, pp. 59-67, Nov. 2002.
10 I. You, K. Sakurai and Y. Hori, "A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6," IEICE Transaction on Communications, Vol. E92-B, no. 06, pp.2287-2290, June 2009   DOI   ScienceOn
11 J. Kempf and R. Koodli, "Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)," IETF RFC 5269, June 2008
12 W. Haddad and S. Krishnan, "Authenticating FMIPv6 Handovers," IETF Internet Draft, draft-haddad-mipshop-fmipv6-auth-02, Sep. 2006
13 F. Dupont, M. Laurent-Maknavicius and J. Bournelle, "AAA for mobile IPv6," IETF Internet Draft, draft-dupont-mipv6-a-aa-01, Nov. 2001
14 I. You, K. Sakurai, and Y. Hori, "An Enhanced Security Protocol for Fast Mobile IPv6," IEICE Transaction on Information & Systems, Vol. E92-D, No.10, pp. 1979-1982, Oct. 2009   DOI   ScienceOn
15 J. Arkko, J. Kempf, B. Zill, and P. Nikander, "SEcure Neighbor Discovery (SEND)," IETF RFC 3971, Mar. 2005
16 T. Aura, "Cryptographically Generated Addresses (CGA)," IETF RFC 3972, Mar. 2005
17 S. Kiriyama, R. Wakikawa, J. Xia and F. Teraoka, "Context Reflector for Proxy Mobile IPv6," In Proc. of 2009 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 588-594, Mar. 2009
18 S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6," IETF RFC 5213, Aug. 2009