Improved Security Mechanism for Mobile IPv6

نویسندگان

  • Jing Li
  • Po Zhang
  • Srinivas Sampalli
چکیده

Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. The original security scheme, the return routability (RR) procedure, used in Mobile IPv6 route optimization does not protect against adversaries who are on the path between the home agent (HA) and the correspondent node (CN) [11]. In addition, the long latency associated with the return routability test can impact delay-sensitive applications. This paper presents a hash chain based security mechanism to improve the security and performance of the return routability procedure in Mobile IPv6. Our fast authentication mechanism utilizes the hash chain element as an extra certificate to the mobile node in authenticating binding updates while running the routing process. In addition, by removing the necessity of the home test procedure in the RR test our mechanism can reduce the binding update latency. We analyze the security strength of our scheme under different adversary scenarios. Furthermore, a performance comparison of our scheme and the original RR procedure is provided

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transport Layer Security (TLS) Implementation for Secured MN- HA Communication in Mobile IPv6

Mobile IPv6 usually use the IPsec/IKEv2 to secure Mobile Node (MN) and Home Agent (HA) communication. The implementation of IPsec/IKEv2 with MIPv6 is complex because it requires a tight coupling between MIPv6 protocol part and the IPsec/IKEv2 part of the IP stack. This paper proposes a security mechanism which uses Transport Layer Security (TLS) for establishing Keying Material and other bootst...

متن کامل

Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks

خسارات وارد شده به شبکه گاز شهری در یک زلزله می­تواند زیان­های زیادی از جمله خسارت ناشی از آتش­سوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتش­سوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارت­های مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...

متن کامل

A Robust Secured Mobile IPv6 Mechanism for Multimedia Convergence Services

Mobile IPv6 has been developed to enable mobility in IP networks for mobile terminals. Mobile IPv6 security standardization is still ongoingand security issues are one of the primary considerations that need to be address. In this paper we proposed a mechanism that if will be adopted;MIPv6 will have a better security. This proposed new security mechanism for Mobile IPv6 which to make the RR met...

متن کامل

Security enhancement for IPv6 mobility using Certificateless Public Key Encryption

Mobile IPv6, also known as MIPv6, is an IETF standard that has added the roaming capabilities of Mobile Nodes (MNs) in IPv6 network. It allows an MN to move from one network to another without any disruption in communication. The MN registers its current location to the Home Agent (HA) and the Correspondent Node (CN) with the help of a secure Binding Update (BU). Return Routability Protocol (RR...

متن کامل

A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks

During the last few years, it has become more and more conpeling in mobile applications, mobile IPv6 technology is convenient, but also produces a series of security compromise. Identify authentication is an important part of the network security. In this paper, we proposed a secure identify authentication scheme combining reputation mechanism, which considers inters domain trust relationship b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2008