End-point Identifiers in Secure Multi-homed Mobility

نویسندگان

  • Jukka Ylitalo
  • P. Jokela
  • Jorma Wall
چکیده

Currently IP addresses are used both for node identifiers and topological location names in the Internet. The semantic overloading and non-cryptographic nature of IP addresses makes it impossible to use them as identifiers from the security point of view. The problem becomes even worse with multi-homed mobile nodes. Multi-homed mobile nodes have several interfaces bound to dynamically changing IP addresses. When a node changes its point of attachment to the network or it reroutes traffic from one interface to another, the connection identifiers are changed. A peer node cannot verify the validity of the new identifiers without a naming trust relationship between the identifiers and the identity of the node. The peer must have evidence that an identifier belongs to a specific identity. Currently, there are no way for a node, using traditional IP addresses, to prove that it owns a specific address, i.e., an identifier. We present in this paper the philosophy behind separation of end-point identifiers from location names, which is an essential part in designing secure multi-homed mobility architectures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design Requirements for a Global Name Service for a Mobility-Centric, Trustworthy Internetwork

The Internet’s tremendous success as well as our maturing realization of its architectural shortcomings have attracted significant research attention towards clean-slate re-designs in recent times. A number of these shortcomings can be traced back to naming. The current Internet uses IP addresses to conflate identity and network location, which results in poor support for mobility and multihomi...

متن کامل

A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts

Modern consumer devices, like smartphones and tablets, have multiple interfaces (e.g., WiFi and 3G) that attach to new access points as users move. These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed end-points with topology-dependent addresses. As a result, hosts typically cannot spread a connection over multiple interfaces or path...

متن کامل

Secure and Manageable Virtual Private Networks for End-users

This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environment called a portspace is bound to only one VPN, i.e., single-homed. Using this feature of portspaces, personal networks address several problems at multi-homed hosts that use multiple VPNs. Information flow is separat...

متن کامل

An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments

As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLAN) mobility causes continuously increased Round Trip Times (RTT) resulting from 802.11 MAC retransmissions, regardless of the service specified by upper layers. We present scenarios where the current understanding of ...

متن کامل

A new Name Space for End-Points: Implementing secure Mobility and Multi-homing across the two versions of IP

The current practice of naming Internet nodes with their IP address has turned out to be insufficient. We propose adding a new name space to the IP stack, and using cryptographic public keys as end-point names. It turns out that this allows us to provide end-node mobility and multihoming, even between IPv4 and IPv6, in a fairly simple, secure, and elegant way.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002