Skip to main content

Mobile IPv6 Security

  • Conference paper
Book cover Security Protocols (Security Protocols 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Included in the following conference series:

Abstract

This paper presents a case study of security protocol design: authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protocol design. The goal is to solve any new security issues caused by the introduction of mobility without requiring any new security infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87–97. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  2. Hinden, R.M., Deering, S.E.: IP version 6 addressing architecture. RFC 2373, IETF Network Working Group (July 1998)

    Google Scholar 

  3. Huitema, C.: Routing in the Internet. Prentice-Hall, Englewood Cliffs (1995)

    Google Scholar 

  4. Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in IPv6. Internet-Draft, IETF Mobile IP Working Group (June 2003) (work in progress) draft-ietf-mobileip-ipv6-24.txt

  5. Montenegro, G., Castelluccia, C.: SUCV identifiers and addresses. Internet Draft, IETF (November 2001) (work in progress) draft-montenegro-sucv-02.txt

  6. Nikander, P.: A scaleable architecture for ipv6 address ownership. Internet- Draft (March 2001) (Work in progress) draft-nikander-ipng-pbk-addresses-00.txt

  7. Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: Proc. Network and Distributed Systems Security Symposium (NDSS 2003), San Diego, CA USA, February 2003, pp. 87–99 (2003)

    Google Scholar 

  8. O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review 31(2) (April 2001)

    Google Scholar 

  9. Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR) 31(3) (July 2001)

    Google Scholar 

  10. Roe, M., Aura, T., O’Shea, G., Arkko, J.: Authentication of Mobile IPv6 binding updates and acknowledgments. Internet Draft, IETF Mobile IP Working Group (November 2001) (work in progress) draft-roe-mobileipupdateauth-01.txt

  11. Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spaffold, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA USA, May 1997, pp. 208–223. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aura, T. (2004). Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics