Abstract
This paper presents a case study of security protocol design: authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protocol design. The goal is to solve any new security issues caused by the introduction of mobility without requiring any new security infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87–97. Springer, Heidelberg (1997)
Hinden, R.M., Deering, S.E.: IP version 6 addressing architecture. RFC 2373, IETF Network Working Group (July 1998)
Huitema, C.: Routing in the Internet. Prentice-Hall, Englewood Cliffs (1995)
Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. Internet-Draft, IETF Mobile IP Working Group (June 2003) (work in progress) draft-ietf-mobileip-ipv6-24.txt
Montenegro, G., Castelluccia, C.: SUCV identifiers and addresses. Internet Draft, IETF (November 2001) (work in progress) draft-montenegro-sucv-02.txt
Nikander, P.: A scaleable architecture for ipv6 address ownership. Internet- Draft (March 2001) (Work in progress) draft-nikander-ipng-pbk-addresses-00.txt
Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proc. Network and Distributed Systems Security Symposium (NDSS 2003), San Diego, CA USA, February 2003, pp. 87–99 (2003)
O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review 31(2) (April 2001)
Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR) 31(3) (July 2001)
Roe, M., Aura, T., O’Shea, G., Arkko, J.: Authentication of Mobile IPv6 binding updates and acknowledgments. Internet Draft, IETF Mobile IP Working Group (November 2001) (work in progress) draft-roe-mobileipupdateauth-01.txt
Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spaffold, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA USA, May 1997, pp. 208–223. IEEE Computer Society Press, Los Alamitos (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aura, T. (2004). Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive