Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)
نویسندگان
چکیده
Fast Mobile IPv6 requires that a Fast Binding Update is secured using a security association shared between an Access Router and a Mobile Node in order to avoid certain attacks. In this document, a method for provisioning a shared key from the Access Router to the Mobile Node is defined to protect this signaling. The Mobile Node generates a public/private key pair using the same public key algorithm as for SEND (RFC 3971). The Mobile Node sends the public key to the Access Router. The Access Router encrypts a shared handover key using the public key and sends it back to the Mobile Node. The Mobile Node decrypts the shared handover key using the matching private key, and the handover key is then available for generating an authenticator on a Fast Binding Update. The Mobile Node and Access Router use the Router Solicitation for Proxy Advertisement and Proxy Router Advertisement from Fast Mobile IPv6 for the key exchange. The key exchange messages are required to have SEND security; that is, the source address is a Cryptographically Generated Address (CGA) and the messages are signed using the CGA private key of the sending node. This allows the Access Router, prior to providing the shared handover key, to verify the authorization of the Mobile Node to claim the address so that the previous care-of CGA in the Fast Binding Update can act as the name of the key. Kempf & Koodli Standards Track [Page 1] RFC 5269 FMIP Security June 2008 Table of
منابع مشابه
An Enhanced Security Protocol for Fast Mobile IPv6
Recently, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to the SEND protocol, it suffers from denial of service attacks and e...
متن کاملFast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks
Mobile IP (Internet Protocol) allows a mobile node to send and receive packets with its home IP address, regardless of the IP address of its current point of attachment in the Internet. Since Mobile IP induces the handover latency due to mobility management operations, fast handover algorithms have been studied to reduce the latency. In this paper, we optimize the handover procedure in Fast Han...
متن کاملA Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, ...
متن کاملThe Impacts of Signaling Time on the Performance of Fast Handovers for MIPv6
A Fast Handover protocol (FMIPv6) in IETF working group is proposed to reduce the handover latency in Mobile IPv6 standard protocol. The FMIPv6 proposes some procedures for fast movement detection and fast binding update to minimize the handover latency. Additionally, to reduce the lost packets caused by a handover, this protocol introduces buffers in access routers. However, the handover laten...
متن کاملAn Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover
IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 5269 شماره
صفحات -
تاریخ انتشار 2008