Enhancing SVO Logic for Mobile IPv6 Security Protocols

نویسندگان

  • Ilsun You
  • Yoshiaki Hori
  • Kouichi Sakurai
چکیده

In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node’s address as a public key certificate to authenticate its public key because no global public key infrastructure is available in MIPv6 environments. In addition, they execute an appropriate address test to check if a node exists at its claimed address. With such security features, the protocols prevent critical attacks including redirect, man-in-the middle, and denial of service ones. On the other hand, it is clearly of paramount importance to formally evaluate the MIPv6 security protocols to design them without flaws. Unfortunately, there is lack of the formal verification method to precisely reason about their correctness while considering their unique security properties to our best knowledge. In this paper, we propose an extended SVO logic for the thorough verification of the MIPv6 security protocols. Then, we show its effectiveness by applying the proposed logic to four security protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emerging Security Technologies and Applications

Due to the quick increase in number of mobile, ubiquitous, cloud, network and communication applications and studies, many computer and communication systems, wired or wireless, have been released to service their customers (human users or other systems). However, hackers everywhere around the world may attack these systems for some reasons, e.g., stealing one company’s business secrets for ano...

متن کامل

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang...

متن کامل

Enhancing Hierarchical Mobile IPv6 Addressing for the Annex Architecture

We present a new Hierarchical Mobile IPv6 based addressing scheme for an advanced experimental network, called Annex. This addressing scheme provides backward compatibility with standard Internet Protocols, but has been enhanced to allow fine-grained access control and network aware routing in order to provide improved security, real-time performance and robustness for communication between Ann...

متن کامل

Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method

Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols fo...

متن کامل

Designing the mobile IPv6 security protocol

Mobile IPv6 is a network-layer mobility protocol for the IPv6 Internet. The protocol includes several security mechanisms, such as the return-routability tests for the care-of addresses. This paper explains the threat model and design principles that motivated the Mobile IPv6 security features. While many of the ideas have become parts of the standard toolkit for designing Internet mobility pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011