Dual Identity Return Routability for the Security of Mobile Ipv6 Binding Updates within the Distributed Authentication Protocol
نویسندگان
چکیده
The future fourth generation 4G networks will provide us with a paradigm shift in how mobile telecommunications will operate. It will be solely based on packet switching using mobile IPv6. However binding update route optimisation is vulnerable to a variety of security attacks. This paper attempts to reduce the security vulnerabilities by creating a new security protocol by first investigating the possible future technologies which may be incorporated into 4G mobile phones. Various technologies such as WI-FI and WiMax will be looked at but one in particular may be of particular interest, sim cards which allow the user to have multiple phone numbers. Using this technology and combining it with the established security protocol return routability, a new enhanced security solution is created called Dual Identity Return Routability. This solution provides an enhanced reachability test and a cheap authentication method, which can be incorporated into the distributed authentication protocol or be used as a stand-alone solution. Key-Words: Mobile IPv6, Binding Updates, Security, Authentication, Return Routability, Dual Identity.
منابع مشابه
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. The original security scheme, the return routability (RR) procedure, used in Mobile IPv6 route optimization does not protect against adversaries who are on the path between the home agent (HA) and the correspondent node ...
متن کاملFlooding attack on the binding cache in mobile IPv6
In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out...
متن کاملAn Optimized Scheme for Mobile IPv6 Handover Between Domains Based on AAA
When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for authentication, authorization and accounting. AAA and Mobile IPv6 are operated independently. Hence schemes which merge these protocols have been emerged. These schemes enable the mobile node to establish a security association between the mobile node and a home agent, and to perform a home binding update d...
متن کاملDesigning the mobile IPv6 security protocol
Mobile IPv6 is a network-layer mobility protocol for the IPv6 Internet. The protocol includes several security mechanisms, such as the return-routability tests for the care-of addresses. This paper explains the threat model and design principles that motivated the Mobile IPv6 security features. While many of the ideas have become parts of the standard toolkit for designing Internet mobility pro...
متن کاملSecure Mobile IP with HIP Style Handshaking and Readdressing for public-key based IP network
Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management an...
متن کامل