Abstract
In Mobile IPv6, each packet sent and received by a mobile node contains its home address. As a result, it is very easy for an eavesdropper or for a correspondent node to track the movement and usage of a mobile node. This paper proposes a simple and practical solution to this problem. The main idea is to replace the home address in the packets by a temporary mobile identifier (TMI), that is cryptographically generated and therefore random. As a result, packets cannot be linked to a mobile node anymore and traffic analysis is more difficult. With our solution, an eavesdropper can still identify the IP addresses of two communicating nodes but is not able to identify their identities (i.e., their home addresses). Furthermore since a mobile node uses a new identifier for each communication, an eavesdropper cannot link the different communications of a given mobile node together. We show that HMIPv6 can also benefit from the proposed privacy extension.
Chapter PDF
Similar content being viewed by others
Keywords
References
Arkko, J., Devarapalli, V., and Dupont, F. (2004). Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. IETF, RFC3676.
Aura, T. (2003). Cryptographically generated addresses (CGA). In 6th Information Security Conference (ISC’03, volume 2851, pages 29–43, Bristol, UK. LNCS.
Fasbender, A., Kesdogan, D., and Kubitz, O. (1996). Analysis of security and privacy in mobile ip.
Hinden, R., O’Dell, M., and Deering, S. (1998). An IPv6 Aggregatable Global Unicast Address Format. IETF, RFC2364.
Johnson, D., Perkins, C, and Arkko, J. (2004). Mobile IP for IPv6. IETF, RFC 3775.
Kaufman, C., E. (2004). Internet Key Exchange IKEv2 Protocol. IETF, draft-ietf-ipsec-ikev2-14.txt.
Montenegro, G. (2001). Reverse Tunneling for Mobile IP, revised. IETF, RFC3024.
Montenegro, G. and Castelluccia, C. (2004). Crypto-Based Identifiers (cbids): Concepts and applications. ACM TISSEC, 7(1).
Narten, T. and Draves, R. (2001). Privacy Extensions for Stateless Address Autoconfiguration in IPv6. IETF, RFC3041.
O’Shea, G. and Roe, M. (2001). “Child-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review.
Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4).
Soliman, H., Castelluccia, C, El-Malki, K., and Bellier, L. (2004). Hierarchical MIPv6 mobility management. IETF, draft-ietf-mipshop-hmipv6-01.txt, work in progress.
Thomson, S. and Narten, T. (1998). IPv6 Address Autoconfiguration. IETF, RFC2462.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Castelluccia, C., Dupont, F., Montenegro, G. (2005). A Simple Privacy Extension for Mobile IPv6. In: Belding-Royer, E.M., Al Agha, K., Pujolle, G. (eds) Mobile and Wireless Communication Networks. MWCN 2004. IFIP International Federation for Information Processing, vol 162. Springer, Boston, MA. https://doi.org/10.1007/0-387-23150-1_21
Download citation
DOI: https://doi.org/10.1007/0-387-23150-1_21
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23148-8
Online ISBN: 978-0-387-23150-1
eBook Packages: Computer ScienceComputer Science (R0)