Skip to main content

IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4266))

Abstract

Address proxying is a process by which one IP node acts as an endpoint intermediary for an IP address that actually belongs to another IP node. Address proxying serves many useful functions in IP networks. In IPv6, the Secure Neighbor Discovery Protocol (SEND) provides powerful tools for securing the mapping between the IP address and the link address which is the basis of local link address proxying; however, these tools don’t work for address proxies. In this paper, we present an extension to SEND for secure proxying. As an example of how secure address proxying can be used, we propose a minor extension of the Mobile IPv6 protocol to allow secure proxying by the home agent. We then present measurements comparing SEND with and without the address proxying extensions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arkko, J. (ed.), Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND), RFC 2971 (March 2005)

    Google Scholar 

  2. Aura, T.: Cryptographically Generated Addresses (CGA), RFC 3972 (March 2005)

    Google Scholar 

  3. Chaum, S., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  4. Daley, G.: Securing Proxy Neighbour Discovery Problem Statement. Internet Draft (work in progress, 2004)

    Google Scholar 

  5. Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad-Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609–626. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, RFC 3775 (June 2004)

    Google Scholar 

  7. Kempf, J., Gentry, C.: Secure IPv6 Address Proxying using Multi-Key Cryptographically Generated Addresses (MCGAs). Internet Draft (work in progress)

    Google Scholar 

  8. Montenegro, G., Castellucia, C.: Crypto-Based Identifiers (CBIDs): Concepts and Applications. ACM Transactions on Information and System Security 7(1), 97–127 (2004)

    Article  Google Scholar 

  9. Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP version 6 (IPv6), RFC 2461 (December 1998)

    Google Scholar 

  10. National Institute of Standards and Technology, Secure Hash Standard, Federal FIPS 180-181 (April 1993)

    Google Scholar 

  11. National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), FIPS 197 (November 2001)

    Google Scholar 

  12. Nikander, P., Arkko, J.: Delegation of Signalling Rights. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 203–214. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Nikander, P., Kempf, J., Nordmark, E.: IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756 (May 2004)

    Google Scholar 

  14. O’Shea, G., Roe, M.: Child-proof Authentication for MIP6 (CAM). ACM SIGCOMM Computer Communication Review 31(2), 4–8 (2001)

    Article  Google Scholar 

  15. Plummer, D.C.: Ethernet Address Resolution Protocol, RFC 826 (November 1982)

    Google Scholar 

  16. Rivest, R., Shamir, A., Tauman, Y.: How to Leak A Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Thompson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, RFC 2462 (December 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kempf, J., Wood, J., Ramzan, Z., Gentry, C. (2006). IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds) Advances in Information and Computer Security. IWSEC 2006. Lecture Notes in Computer Science, vol 4266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908739_14

Download citation

  • DOI: https://doi.org/10.1007/11908739_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47699-3

  • Online ISBN: 978-3-540-47700-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics