• Title/Summary/Keyword: mobile IPv4

Search Result 135, Processing Time 0.027 seconds

Improved Mobile IP support of MPLS over IPv6 (IPv6 기반, MPLS환경에서의 향상된 이동 IP 기법)

  • 윤형구;최성민;강인석;신용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.283-285
    • /
    • 2000
  • 현재의 인터넷은 IPv4를 기반으로 하며, CIDR(Classless InterDomain Routing)을 이용하여 IP의 고갈을 막으려고 노력하고 있다. 그러나, 이는 근본적인 대책이 아니기 EOans에 IP는 점차 고갈되어 미래에는 IPv6로 옮겨갈 것으로 보인다. 이렇게 IPv6로 발전함에 따라 IP 주소는 매우 늘어날 수 있으나, source 주소와 destination 주소의 헤더가 커짐에 따라 헤더의 IP 주소를 모두 읽어보는 데에 많은 비용(cost)이 들게 된다. 따라서, ISP들은 MPLS(Multiprotocol Label Switching)를 사용하게 될 것이다. 또한, MPLS는 기존의 IP 주소를 이용한 라우팅은 경로를 찾기 위해 필요이상으로 많은 정보를 요구한다고 보고, 레이블 개념을 도입하여 스위칭해주는 역할을 한다. 이렇게 하면 라우팅을 위해 IPv6로 인하여 더욱 길어진 IP 주소를 요구하지 않고 단지 레이블을 붙임으로 속도를 향상시킬 수 있다. 이러한 환경에서의 이동 IP는 COA를 얻게되면 레이블을 붙여서 목적지까지 전달되게 된다. 이렇게 전달되는 이동 IP에서 COA와 레이블을 합쳐서 하나로 보내는 방식으로 이동 IP의 효율을 높일 수 있다.

  • PDF

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

A Study on Routing Implementation and Performance Measurement Scheme among IPv6 Terminals (IPv6 단말간 라우팅 구현과 성능측정 구성 방안에 관한 연구)

  • Woo, Jung-Yoon;Yang, JaeSoo;Lee, Jong Won;Kim, Kangju
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.505-512
    • /
    • 2018
  • Internet demand has increased rapidly, and Internet Protocol Version 4, the main Internet protocol, can not cope with various types of network demand in the future. Therefore, it is urgent to spread IPv6-based stable network to solve the shortage of Internet address resources. Due to the proliferation of IoT and the increase in mobile devices, efficient and optimal IPv6 routing design is indispensable. In this paper, we have studied about characteristics of IPv6, address system of IPv6, structure analysis and efficient routing technology among IPv6 terminals. Furthermore, experimental results on routing packet analysis and convergence time are presented in network - based IPv6 routing implementation environment. In addition, we show the results of the experiment analysis by dividing the implementation of IPv6 routing, operation test, and fail over performance into three kinds of routing protocol methods. As a result, this study can be applied to the introduction of IPv6 system, test bed environment construction, and network design.

Modified CGA for Frequently Moving Mobile Nodes in Secure Neighbor Discovery

  • Kim, Esther;Kim, Nam-Uk;Kim, Soo-Duek;Chung, Tae-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.537-538
    • /
    • 2009
  • IPv6 is newly introduced to solve limitations and problems of IPv4 and in IPv6 network, nodes use Neighbor Discovery protocol to discover the subnet prefix and configure its own address. However, Neighbor Discovery is vulnerable to various attacks as it does not have secure mechanism to protect itself. Thus, the Secure Neighbor Discovery has introduced and the main mechanism used in Secure Neighbor Discovery is Cryptographically Generated Address. In this paper, we provide a brief of Cryptographically Generated Address and its limitation in a case where a mobile node moves from one network to another frequently. The proposed scheme resolves this limitation by using the fixed interface identifier.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Analysis of the Threats abusing IPv6 Fragment Header

  • Zhao, Zhen;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1087-1090
    • /
    • 2007
  • The security issues related to IPv6 protocol have been focused on by many researchers and engineers. Especially, extension headers of IPv6 protocol provide various functionalities such as IP security, mobile IP, and in principle, it is said to give much more effective network services than the previous protocol, IPv4. In this paper, the cases are surveyed in which fragment header, that is one of many extension headers in IPv6 protocol, is abused and made to be the sources of threats. Prevention mechanisms are also surveyed to countermeasure the threats.

Scenarion proposal, requirements analysis, and performance test about transition mechanism in the mobile internet environment (이동 인터넷 환경에서의 전이 메커니즘에 대한 시나리오 제시와 요구사항 분석 및 성능 측정)

  • 권금연;황인준;안병호;이승윤;강현국
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.31-33
    • /
    • 2003
  • 현재 국외에서는 산업계 및 학계를 중심으로 기존의 IPv4와 연동 가능한 IPv6에 대한 연구를 추진하고 있다. 또한 국내에서도 IETF의 표준화 기술을 중심으로 몇몇 기관에서 고정망 중심의 IPv6 전이 메커니즘을 구현하고 있다. 그러나 연동 기술에 대한 연구가 고정망에 중심을 두고 있어 이동망에서의 연동 구조에 대한 연구는 부족한 현실이다. 이와 같이 국내외적으로 IPv6망에서의 이중 스택 구조는 고정망을 기반으로 연구가 진행되고 있지만, 이동 인터넷 환경에서의 전이 메커니즘에 대한 연구는 부족한 실정이다. 따라서 본 논문에서는 이동 인터넷 환경에서의 전이 메커니즘에 대한 시나리오 제안과 요구사항 분석을 하고, 절기서 제안된 메커니즘들 중 6to4에 이동성을 적응했을 때의 성능 측정 결과를 제시한다

  • PDF

Proposal of a mobility management scheme for sensor nodes in IoT(Internet of Things) (사물인터넷(IoT)환경에서 센서 노드들의 이동성 관리 방안에 관한 제안)

  • Park, Seung-Kyun
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.59-64
    • /
    • 2016
  • 6LoWPAN (IPv6 over Low Power Wireless Sensor Network) standardized by IETF does not support the mobility of wireless sensor nodes. Since the wireless sensor node, subject to a lot of constraints in the CPU, memory, a battery is not easy to apply to existing protocols such as Mobile IPv6. In this paper, we propose a novel mobility management architecture and methods to work with 6LoWPAN based on the analysis on FPMIPv6 (Fast PMIPv6) the host is not a handover procedure performed in order to support the mobility of such sensor nodes. It was suggested the use of a dispatch code pattern that is not currently used in 6LoWPAN for inter-working, MAG and MAC, MAC in order to reduce packet loss caused as the authentication delay in the handover process to minimize the power consumption of a sensor node that is caused by the re-transmission the new concept of temporary guarantee (temporary guarantee) and trust relationships (trust relationship) between AAA and introduced.

A Study on Enhanced Binding Update based on Ticket for Mobile IPv6 (Mobile IPv6에서의 향상된 티켓 기반 바인딩 갱신 프로토콜에 관한 연구)

  • Lee Joong-Hee;Lee Jong-Hyouk;Han Young-Ju;Chung Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1053-1056
    • /
    • 2006
  • Mobile IPv6의 바인딩 갱신 메커니즘은 이동 노드가 새로운 링크로 이동하여 처음으로 시행되는 바인딩 갱신과 같은 링크 내에 머물고 있을 때, 혹은 바인딩의 수명으로 인하여 시행되는 바인딩 갱신으로 나눌 수 있다. 하지만 이 모든 과정을 모두 동일한 메커니즘으로 시행하기 때문에 비효율적이다. 이러한 단점을 해결하기 위한 방안으로 티켓 기반의 바인딩 갱신 프로토콜[4]이 제안되었다. 그렇지만 이것은 대응 노드가 고정 노드라는 가정 하에 만들어졌기 때문에 대응 노드가 이동 노드일 경우 바인딩 갱신이 비효율적인 경로를 통해 이루어진다. 이에 본 논문에서는 티켓을 이용하여 첫 번째 바인딩 갱신 이후에 이동 노드와 대응 노드가 홈 에이전트의 도움 없이 바인딩을 갱신하며 대응 노드가 이동성을 갖는 경우에도 효과적으로 해결할 수 있는 프로토콜을 제시한다. 본 논문에서 제안하는 프로토콜은 대응 노드가 이동성을 갖는 경우 기존의 티켓 기반의 바인딩 갱신 프로토콜에 비해 적합하며 대응 노드를 고정 노드로 가정하고 진행된 다른 많은 연구에도 적용될 수 있다.

  • PDF