Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2010.17C.2.153

Clue for Secure Route Optimization in Mobile IPv6  

Song, Se-Hwa (성균관대학교 전자전기컴퓨터공학과)
Choi, Hyoung-Kee (성균관대학교 정보통신공학부)
Kim, Jung-Yoon (성균관대학교 휴대폰학과)
Abstract
Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.
Keywords
Moble IPv6; Security; Route Optimization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Veigner and C. Rong, “Flooding Attack on the Binding Cache in Mobile IPv6,” 2007.
2 P. Nikander, J. Arkko, T. Aura, and G. Montenegro, “Mobile IP version 6 (MIPv6) route optimization security design,” in Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, 2003, pp.2004-2008 Vol.3.
3 S. Ortiz, “4G Wireless Begins to Take Shape,” Computer, Vol.40, pp.18-21, 2007.   DOI   ScienceOn
4 D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775, June, 2004.
5 C. Veigner and C. Rong, “A new Route Optimization protocol for Mobile IPv6 (ROM),” in International Computer symposium Taipei, 2004.
6 T. Aura, “Mobile IPv6 Security,” in Security Protocols, 2004, pp.3-13.
7 R. H. Deng, J. Zhou, and F. Bao, “Defending against redirect attacks in mobile IP,” in 9th ACM Conference on Computer and Communications Security (CCS), Washington, 2002, pp.59-67.   DOI
8 C. Perken, “IP Mobility Support,” RFC 2002, October, 1996.
9 K. Elgoarany and M. Eltoweissy, “Security in Mobile IPv6: A survey,” Information Security Technical Report, Vol.12, pp.32-43, 2007.
10 K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, and R. H. Deng, “Routing optimization security in mobile IPv6,” Computer Networks, Vol.50, pp.2401-2419, 2006.   DOI   ScienceOn
11 O. S. Greg and R. Michael, “Child-proof authentication for MIPv6 (CAM),” SIGCOMM Comput. Commun. Rev., Vol.31, pp.4-8, 2001.   DOI
12 H. Fathi, S. SeongHan, K. Kobara, S. S. Chakraborty, H. Imai, and R. Prasad, “Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks,” Selected Areas in Communications, IEEE Journal on, Vol.23, pp.2182-2193, 2005.   DOI   ScienceOn