A Simple Privacy Extension for Mobile IPv6

  • Claude Castelluccia
  • Francis Dupont
  • Gabriel Montenegro
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 162)


In Mobile IPv6, each packet sent and received by a mobile node contains its home address. As a result, it is very easy for an eavesdropper or for a correspondent node to track the movement and usage of a mobile node. This paper proposes a simple and practical solution to this problem. The main idea is to replace the home address in the packets by a temporary mobile identifier (TMI), that is cryptographically generated and therefore random. As a result, packets cannot be linked to a mobile node anymore and traffic analysis is more difficult. With our solution, an eavesdropper can still identify the IP addresses of two communicating nodes but is not able to identify their identities (i.e., their home addresses). Furthermore since a mobile node uses a new identifier for each communication, an eavesdropper cannot link the different communications of a given mobile node together. We show that HMIPv6 can also benefit from the proposed privacy extension.


Mobile IPv6 CGA Privacy 


  1. [Arkko et al, 2004]
    Arkko, J., Devarapalli, V., and Dupont, F. (2004). Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. IETF, RFC3676.Google Scholar
  2. [Aura, 2003]
    Aura, T. (2003). Cryptographically generated addresses (CGA). In 6th Information Security Conference (ISC’03, volume 2851, pages 29–43, Bristol, UK. LNCS.Google Scholar
  3. [Fasbender et al., 1996]
    Fasbender, A., Kesdogan, D., and Kubitz, O. (1996). Analysis of security and privacy in mobile ip.Google Scholar
  4. [Hinden et al., 1998]
    Hinden, R., O’Dell, M., and Deering, S. (1998). An IPv6 Aggregatable Global Unicast Address Format. IETF, RFC2364.Google Scholar
  5. [Johnson et al., 2004]
    Johnson, D., Perkins, C, and Arkko, J. (2004). Mobile IP for IPv6. IETF, RFC 3775.Google Scholar
  6. [Kaufman, 2004]
    Kaufman, C., E. (2004). Internet Key Exchange IKEv2 Protocol. IETF, draft-ietf-ipsec-ikev2-14.txt.Google Scholar
  7. [Montenegro, 2001]
    Montenegro, G. (2001). Reverse Tunneling for Mobile IP, revised. IETF, RFC3024.Google Scholar
  8. [Montenegro and Castelluccia, 2004]
    Montenegro, G. and Castelluccia, C. (2004). Crypto-Based Identifiers (cbids): Concepts and applications. ACM TISSEC, 7(1).Google Scholar
  9. [Narten and Draves, 2001]
    Narten, T. and Draves, R. (2001). Privacy Extensions for Stateless Address Autoconfiguration in IPv6. IETF, RFC3041.Google Scholar
  10. [O’Shea and Roe, 2001]
    O’Shea, G. and Roe, M. (2001). “Child-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review.Google Scholar
  11. [Reed et al., 1998]
    Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4).Google Scholar
  12. [Soliman et al., 2004]
    Soliman, H., Castelluccia, C, El-Malki, K., and Bellier, L. (2004). Hierarchical MIPv6 mobility management. IETF, draft-ietf-mipshop-hmipv6-01.txt, work in progress.Google Scholar
  13. [Thomson and Narten, 1998]
    Thomson, S. and Narten, T. (1998). IPv6 Address Autoconfiguration. IETF, RFC2462.Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Claude Castelluccia
    • 1
  • Francis Dupont
    • 2
  • Gabriel Montenegro
    • 3
  1. 1.INRIA Rhone-AlpesSaint Ismier CedexFrance
  2. 2.GET/ENST BretagneCesson-Sevigne CedexFrance
  3. 3.Sun Labs, EuropeSaint Ismier CedexFrance

Personalised recommendations