Skip to main content

Flooding Attack on the Binding Cache in Mobile IPv6

  • Conference paper
  • 413 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 3))

Abstract

In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.

This work was supported by UiS 95310, Rogaland University Fund.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2845, pp. 215–234. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  • Deng, R.H., Zhou, J., Bao, F.: Defending Against Redirect Attacks in Mobile IP. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York (2002)

    Google Scholar 

  • Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture, IETF RFC 3513 (2003)

    Google Scholar 

  • Johnson, D., Percins, C., Arkko, J.: Mobility Support in IPv6, IETF RFC 3775 (2004)

    Google Scholar 

  • Nikander, P., Arrko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background, IETF Internet-draft (2005)

    Google Scholar 

  • Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, IETF RFC 2462 (1998)

    Google Scholar 

  • Veigner, C., Rong, C.: A new Route Optimization protocol for Mobile IPv6 (ROM). In: International Computer symposium 2004, Taipei (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joaquim Filipe Helder Coelhas Monica Saramago

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Veigner, C., Rong, C. (2007). Flooding Attack on the Binding Cache in Mobile IPv6. In: Filipe, J., Coelhas, H., Saramago, M. (eds) E-business and Telecommunication Networks. ICETE 2005. Communications in Computer and Information Science, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75993-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75993-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75992-8

  • Online ISBN: 978-3-540-75993-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics