Abstract
In this paper, we propose a security proxy based protocol for authenticating the binding updates in Mobile IP Version 6 environment, which combines the Deng-Zhou-Bao’s protocol [2] with Aura’s two hash-based CGA scheme [8] to avoid the use of trusted CAs. The two hash-based CGA scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA’s public key than the one of the Deng-Zhou-Bao’s protocol. The comparison of our protocol with other protocols such as the Deng-Zhou-Bao’s protocol, CAM-DH and SUCV shows that our protocol can provide good performance and manageability in addition to stronger security than one hash-based CGA approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arkko, J.: Security Framework for Mobile IPv6 Route Optimization, <draft-arkkomipv6ro- secframework-00.txt> (November 2001)
Deng, R., Zhou, J., Bao, F.: Defending Against Redirect attacks in Mobile IP. In: CCS 2002 (November 2002)
O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review (April 2001)
Roe, M., Aura, T., O’Shea, G., Arkko, J.: Authentication of Mobile IPv6 Binding Updates and Acknowledgments. <draft-roe-mobileip-updateauth-02.txt> (February 2002)
Okazaki, S., Desai, A., Gentry, C.,et. el.: Securing MIPv6 Binding Updates Using Address Based Keys (ABKs) <draft-okazaki-mobileip-abk-01.txt> (October 2002)
Montenegro, G., Castelluccia, C.: SUCV Identifiers and Addresses, <draft-montenegrosucv- 02.txt>, (November 2001)
Johnson, D., Perkins, C., Arkko, A.: Mobility Support in IPv6, <draft-ietf-mobileipipv6- 24.txt> (June 2003)
Aura, T.: Cryptographically Generated Addresses (CGA), <draft-aura-cga-00.txt> (February 2003)
Housley, R., Ford, W., Polk, T., Solo, D.: Internet X.509 public key infrastructure certificate and CRL profile. In: RFC, January 1999, vol. 2459 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
You, IS., Cho, K. (2004). A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive