Abstract
In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.
This work was supported by UiS 95310, Rogaland University Fund.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2845, pp. 215–234. Springer, Heidelberg (2004)
Deng, R.H., Zhou, J., Bao, F.: Defending Against Redirect Attacks in Mobile IP. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York (2002)
Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture, IETF RFC 3513 (2003)
Johnson, D., Percins, C., Arkko, J.: Mobility Support in IPv6, IETF RFC 3775 (2004)
Nikander, P., Arrko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background, IETF Internet-draft (2005)
Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, IETF RFC 2462 (1998)
Veigner, C., Rong, C.: A new Route Optimization protocol for Mobile IPv6 (ROM). In: International Computer symposium 2004, Taipei (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Veigner, C., Rong, C. (2007). Flooding Attack on the Binding Cache in Mobile IPv6. In: Filipe, J., Coelhas, H., Saramago, M. (eds) E-business and Telecommunication Networks. ICETE 2005. Communications in Computer and Information Science, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75993-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-75993-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75992-8
Online ISBN: 978-3-540-75993-5
eBook Packages: Computer ScienceComputer Science (R0)