Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC

被引:9
作者
Rossi, Angelo [1 ]
Pierre, Samuel [1 ]
Krishnan, Suresh [2 ]
机构
[1] Ecole Polytech, Mobile Comp & Networking Lab, Montreal, PQ H3T 1J4, Canada
[2] Ericsson Res, Town Of Mt Royal, PQ H4P 2N2, Canada
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 03期
关键词
CGA; DNSSEC; MIPv6; return routability; route optimization;
D O I
10.1109/JSYST.2012.2222002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With mobile phones evolving every year, it is no surprise that recent surveys have shown that the worldwide number of mobile phone subscriptions reached 5.6 billion in 2011, becoming the largest pool of interconnected devices. Since mobile IP is the most-used protocol by mobile operators, the obvious solution to support more users in their network would be to replace it with MIPv6. In addition to integrating the newest IP stack, MIPv6 adds an important feature meant to replace the inefficient triangle routing by allowing an MN to communicate bidirectionally with the CN without passing through its home agent. However, the lack of preshared information between the MN and CN makes security for this RO mechanism a difficult challenge. MIPv6 adopts the RR mechanism that is only to verify the MN reachability in both its home address and care-of address without being a security feature. Other works have attempted to solve the multiple security issues in RR, but either their design was flawed or their assumptions were unrealistic. This paper presents a secure MIPv6 with a secure and efficient RO that uses DNSSEC to validate CGAs from trusted domains and provides strong authentication rather than the weak sender invariance security property. It integrates an enhanced cryptographically generated address (ECGA) based on a backward key chain that offers support to bind multiple logically linked CGAs together. ECGA tackles the time-memory tradeoff attacks with high efficiency. The validation through both AVANTSSAR and AVISPA platforms show that the proposed solution has no security flaw while still being lightweight in signaling messages on the radio network.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 20 条
  • [1] [Anonymous], 2012, DNS WHITELIST PROTEC
  • [2] [Anonymous], 2005, IETF RFC 4033
  • [3] [Anonymous], 2005, HIERARCHICAL MOBILE
  • [4] [Anonymous], 2008, RFC 5213
  • [5] Arends R., 2005, 4034 RFC
  • [6] Arends Roy, 2005, Rfc 4035: protocol modifications for the dns security extensions
  • [7] Arkko J., 2007, 4866 RFC
  • [8] Bos JW, 2009, LECT NOTES COMPUT SC, V5735, P17, DOI 10.1007/978-3-642-04474-8_2
  • [9] Bradner J. S. S., 2003, IETF IN PRESS
  • [10] Drielsma PH, 2007, LECT NOTES COMPUT SC, V4691, P80