Abstract
Trust establishment seems to be the most difficult problem in mobility and multi-homing management. Many protocol proposals assume the presence of some security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains, and does not require pre-existing security information. The procedure is known to be vulnerable to an active Man-in-the-Middle attack in the first message exchange, however, the procedure is efficient, and does not have inherent scalability problems.
Chapter PDF
7. References
Abley, J. Black, B. & Gill, B. Goals for IPv6 Site-Multihoming Architectures, Internet Engineering Task Force (IETF), RFC 3582, 2003.
Aura, T. Cryptographically Generated Addresses (CGA), in Proceedings of 6th Information Security Conference (ISC'03), Bristol, UK, 2003.
Aura, T. Roe, M. & Arkko. J. Security of Internet Location Management, in Asia-Pacific Computer Systems Architecture Conference, ACSAC'02, Monash University, Melbourne, Australia, February 2002.
Campbell, A. Gomez, J. Kim S., Valko A. Wan, C. & Turanyi, Z. Design, implementation, and evaluation of Cellular IP, IEEE Personal Commun. Mag., Vol. 7, No. 4, pp. 42–49, 2000.
Castelluccia, C. HMIPv6: A Hierarchical Mobile Ipv6 Proposal, ACM Mobile Computing and Communication Review (MC2R), Apr. 2000.
Fischlin, M. Fast Verification of Hash Chains, to appear in the Proceedings of RSA Security 2004, Cryptographer's Track.
Grilo, A. Estrela, P. & Numes, M. Terminal Independent Mobility for IP (TIMIP), IEEE Commun. Mag., Dec. 2001.
Haller, N. The S/KEY One-Time Password System, Internet Engineering Task Force (IETF), RFC 1760, 1995.
Hu, Y-C. Perring, A. & Johnson, D.B. Efficient Security Mechanisms for Routing Protocols, in Proceedings of Network & Distributed System Security Symposium 2003 (NDSS '03), February 6–7, San Diego, CA, pp. 57–73.
Johnson, D. Perkins, C. and Arkko J. Mobility Support in IPv6, Internet Engineering Task Force (IETF), RFC 3775, 2004.
Kempf, J. (editor) Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network, Internet Engineering Task Force (IETF), RFC 3374, 2002.
Kim, J. Provable Secure Anonymous Authentication Protocol based on Hash Chains, A Thesis for the Degree of Master of Science, Information and Communications University, South Korea, available: http://caislab.icu.ac.kr/pub/thesis/down/jskim.pdf. 2003.
Koodli, R. (editor) Fast Handovers for Mobile IPv6, Internet Engineering Task Force (IETF), work in progress, draft-ietf-mipshop-fast-mipv6-01.txt, 2004.
Krawczyk, H. Bellare, M. & Canetti, R. HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force (IETF), RFC 2104, 1997.
Lamport, L. Password Authentication with Insecure Communication, Communications of ACM, Vol 24, No 11, pp. 770–772, 1981.
Merkle, R. Secrecy, authentication, and public key systems, Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979.
Micali, S. Efficient Certificate Revocation, Technical Report, MIT/LCS/TM-542b, MIT Laboratory for Computer Science, 1996.
Mink, S. Pahlke, F. Schafer, G. & Schiller, J. Towards Secure Mobility Support for IP Networks, in Proceedings of the IFIP International Conference on Communication Technologies (ICCT), Aug. 2000.
Moskowitz, R. & Nikander, P. Host Identity Protocol Architecture, Internet Engineering Task Force (IETF), work in progress, draft-moskowitz-hip-arch-05.txt, 2004.
O'Shea, G. & Roe, M. Child-proof authentication for MIPv6 (CAM), ACM SIGCOMM Computer Communication Review, Vol. 31, No 2, pp. 4–8, 2001.
Perkins, C. IP Mobility Support, Internet Engineering Task Force (IETF), RFC 2002, 1996.
Ramjee, R. Porta, T. Salgarelli, L. Thuel, S. & Varadhan, K. IP-based Acess Network Infrastructure for next Generation Wireless Data Networks, IEEE Personal Commun. Mag., Vol. 7, No. 4, 2000.
Richardson, M. & Redelmeier, D. Opportunistic Encryption using The Internet Key Exchange (IKE), Internet Engineering Task Force (IETF), work in progress, draftrichardson-ipsec-opportunistic-15.txt, 2004.
Rivest, R.L. & Shamir, A. PayWord and MicroMint—Two Simple Micropayment Schemes, CryptoBytes, volume 2, number 1 (RSA Laboratories, Spring 1996), pp. 7–11.
Soliman, H. Castelluccia, C. El Malki, K. & Bellier L. Hierarchical Mobile IPv6 mobility management (HMIPv6), Internet Engineering Task Force (IETF), work in progress, draftietf-mipshop-hmipv6-01.txt, 2004.
Tewari, H. & O'Mahony, D. Lightweight AAA for Cellular IP, in Proceedings of European Wireless 2002, February 25–28, 2002 — Florence, Italy, available in http://www.ing.unipi.it/ew2002/.
Valko, A.G. Cellular IP: a new approach to Internet host mobility, ACM SIGCOMM Computer Communication Review, Vol. 29, Number 1, pp. 50–65, 1999.
Yen, S. Ho L., Huang, C. Internet Micropayment Based on Unbalanced One-way Binary Tree, Proceedings of CrypTEC'99, Hong Kong, July, pp. 155–162.
Ylitalo, J. Jokela, P. Wall, J. and Nikander, P. End-point Identifiers in Secure Multi-Homed Mobility", in Proceedings of the 6th International Conference On Principles Of Distributed Systems, Reims, France, December 11–13, pp. 17–28, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Torvinen, V., Ylitalo, J. (2005). Weak Context Establishment Procedure for Mobility and Multi-Homing Management. In: Chadwick, D., Preneel, B. (eds) Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 175. Springer, Boston, MA. https://doi.org/10.1007/0-387-24486-7_8
Download citation
DOI: https://doi.org/10.1007/0-387-24486-7_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24485-3
Online ISBN: 978-0-387-24486-0
eBook Packages: Computer ScienceComputer Science (R0)