Advertisement

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain

  • Ilsun You
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4809)

Abstract

With the increasing usage of Mobile IPv6 in the mobile internet environment, the need of binding update authentication methods to protect malicious biding updates becomes more prevalent. The current authentication methods have tried to secure the biding update process between two previously unknown nodes on the assumption that no global security infrastructure available. However, the assumption is improper for a network domain where involved nodes can establish trust with each other. In this paper, for such a network domain, we propose a ticket based BU authentication method. Our proposed method achieves more efficient and secure binding update through tickets that are issued based on pre-established trust among the involved nodes.

Keywords

Round Trip Time Home Agent Unknown Node Correspond Node Mobile IPv6 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, IETF RFC 3775 (June 2004)Google Scholar
  2. 2.
    Ren, K., Lou, W., Zeng, K., Bao, F., Zhou, J., Deng, R.H.: Routing optimization security in mobile IPv6. Computer Networks 50(13), 2401–2419 (2006)zbMATHCrossRefGoogle Scholar
  3. 3.
    You, I.: Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 336–343. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    You, I., Lim, J.: Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices. In: Cham, T.-J., Cai, J., Dorai, C., Rajan, D., Chua, T.-S., Chia, L.-T. (eds.) MMM 2007. LNCS, vol. 4352, pp. 479–486. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Haddad, W., Dupont, F., Madour, L., Krishnan, S., Park, S.: Optimizing Mobile IPv6 (OMIPv6), IETF Internet Draft, draft-haddad-mipv6-omipv6-01.txt (February 2004) (work in progress)Google Scholar
  6. 6.
    Haddad, W., Madour, L., Arkko, J., Dupont, F.: Applying Cryptographically Generated Addresses to Optimize MIPv6 (CGA-OMIPv6), IETF Internet Draft, draft-haddad-mip6-cga-omipv6-04 (November 2005) (work in progress)Google Scholar
  7. 7.
    Arkko, J., Vogt, C., Haddad, W.: Enhanced Route Optimization for Mobile IPv6, IETF RFC 4866 (May 2007)Google Scholar
  8. 8.
    Dupont, F., Haddad, W.: Optimizing Mobile IPv6 (OMIPv6), IETF Internet Draft, draft-dupont-mipshop-omipv6-00.txt (February 2006) (work in progress)Google Scholar
  9. 9.
    O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review 31(2) (April 2001)Google Scholar
  10. 10.
    Roe, M., Aura, T., O’Shea, G., Arkko, J.: Authentication of Mobile IPv6 Binding Updates and Acknowledgments, Internet Draft, draft-roe-mobileip-updateauth-02.txt, February 2002 (work in progress)Google Scholar
  11. 11.
    Montenegro, G., Castelluccia, C.: Crypto- Based Identifiers(CBIDs): Concepts and Applications. ACM Transations on Information and System Security 7(1), 97–127 (2004)CrossRefGoogle Scholar
  12. 12.
    You, I., Cho, K.: A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
  13. 13.
    Haddad, W., Krishnan, S., Dupont, F.: Mobility Signaling Delegation in OptiSEND, IETF Internet Draft, draft-haddad-mipshop-mobisig-del-02.txt (October 2006) (work in progress)Google Scholar
  14. 14.
    Okazaki, S., Desai, A., Gentry, C., et al.: Securing MIPv6 Binding Updates Using Address Based Keys (ABKs), IETF, draft-okazaki-mobileip-abk-01.txt (October 2002) (work in progress)Google Scholar
  15. 15.
    Aura, T.: Cryptographically Generated Addresses (CGA), IETF RFC 3972 (March 2005)Google Scholar
  16. 16.
    Bradner, S., Mankin, A., Schiller, J.: A Framework for Purpose-Built Keys (PBK), IETF Internet Draft, draft-bradner-pbk-frame-06.txt (October 2003) (Work in progress) Google Scholar
  17. 17.
    Perkins, C.: Securing Mobile IPv6 Route Optimization Using a Static Shared Key, IETF RFC 4449 (June 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ilsun You
    • 1
  1. 1.School of Information Science, Korean Bible University, 205 Sanggye-7 Dong, Nowon-ku, Seoul, 139-791South Korea

Personalised recommendations