Securing Host-Based Mobility and Multi-Homing Protocols against On-Path Attackers

نویسندگان

  • Georg Hampel
  • Vladimir Kolesnikov
چکیده

Host-based mobility and multi-homing protocols allow hosts to migrate ongoing transport sessions between networks or network interfaces. While such protocols can facilitate vertical mobility in a cost-efficient and accessagnostic manner, they are hard to secure when strong authentication between end points is not available. We present a balanced security solution which protects these protocols against redirectionand DoS attacks performed by on-path adversaries, while demanding only insignificant processing overhead on the end nodes. The solution is based on proof of session ownership using secret/answer chains as well as temporal separation and routability tests. It creates a level of protection that requires more (in some cases, significantly more) effort to break than conducting corresponding attacks through existing Internet signaling protocols. We discuss how this solution can strengthen the security of Multi-path TCP. We further show how it improves the security of route-optimized Mobile IPv6 while permitting operation without home agent.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating Multipath TCP Resilience against Link Failures

Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple ...

متن کامل

HMTP: Multipath transport protocol for multihoming wireless erasure networks

This paper proposes a fountain-code-based multi-path transport protocol, called heterogeneous multi-path transport protocol (HMTP), and evaluates its performance. HMTP improves the throughput performance and path utilization of multi-homing wireless erasure networks. It solves the receive buffer blocking problem and eliminates the need for retransmissions and in-order packet delivery, both of w...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

State of the art of Mobility Protocols

.................................................................................................................................. 2 Table of contents .................................................................................................................... 3 Table of figures..................................................................................................................

متن کامل

Strategies for Securing Safety Messages with Fixed Key Infrastructure in Vehicular Network

Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCM

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011