Advertisement

Mobile IPv6 Security

  • Tuomas Aura
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Abstract

This paper presents a case study of security protocol design: authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protocol design. The goal is to solve any new security issues caused by the introduction of mobility without requiring any new security infrastructure.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87–97. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  2. 2.
    Hinden, R.M., Deering, S.E.: IP version 6 addressing architecture. RFC 2373, IETF Network Working Group (July 1998)Google Scholar
  3. 3.
    Huitema, C.: Routing in the Internet. Prentice-Hall, Englewood Cliffs (1995)Google Scholar
  4. 4.
    Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. Internet-Draft, IETF Mobile IP Working Group (June 2003) (work in progress) draft-ietf-mobileip-ipv6-24.txt
  5. 5.
    Montenegro, G., Castelluccia, C.: SUCV identifiers and addresses. Internet Draft, IETF (November 2001) (work in progress) draft-montenegro-sucv-02.txt
  6. 6.
    Nikander, P.: A scaleable architecture for ipv6 address ownership. Internet- Draft (March 2001) (Work in progress) draft-nikander-ipng-pbk-addresses-00.txt
  7. 7.
    Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proc. Network and Distributed Systems Security Symposium (NDSS 2003), San Diego, CA USA, February 2003, pp. 87–99 (2003)Google Scholar
  8. 8.
    O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review 31(2) (April 2001)Google Scholar
  9. 9.
    Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR) 31(3) (July 2001)Google Scholar
  10. 10.
    Roe, M., Aura, T., O’Shea, G., Arkko, J.: Authentication of Mobile IPv6 binding updates and acknowledgments. Internet Draft, IETF Mobile IP Working Group (November 2001) (work in progress) draft-roe-mobileipupdateauth-01.txt
  11. 11.
    Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spaffold, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA USA, May 1997, pp. 208–223. IEEE Computer Society Press, Los Alamitos (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Tuomas Aura
    • 1
  1. 1.Microsoft Research Ltd.CambridgeUK

Personalised recommendations