Skip to main content

Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Abstract

This paper proposes a mechanism to secure the mobile IPv6 networks by integrating identity based cryptosystem with cryptographically generated address. Based on an in-depth analysis of attacks and countermeasures in the CGA-based protocols, this paper gives an analysis of the so called ”unauthentic key attacks”, and presents a mechanism to solve this problem by integrating an IBC scheme called Combined Public Key (CPK) with CGA. Both the deployment considerations and performance analysis of this IBC-CGA scheme are present in the paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aura, T.: Mobile IPv6 security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2845, pp. 215–228. Springer, Heidelberg (2004)

    Google Scholar 

  2. Aura, T., Roe, M.: Designing the mobile ipv6 security protocol. In: Microsoft Research Technical Report MSR-TP-2006-42 (2006)

    Google Scholar 

  3. Ren, K., Lou, W., Zeng, K., Bao, F., Zhou, J.: Routing optimization security in mobile ipv6. Computer Networks 13, 2401–2419 (2006)

    Article  Google Scholar 

  4. Kent, S., Atkinson, R.: Security architecture for the internet protocol. RFC 2401 (1998), http://www.ietf.org/rfc/rfc2401.txt

  5. Arkko, J., Nikander, P.: Weak authentication: How to authenticate unknown principals without trusted parties. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2845, pp. 5–19. Springer, Heidelberg (2004)

    Google Scholar 

  6. Nikander, P.: An address ownership problem in ipv6. Internet Draft, draft-nikander-ipng-addressownership-00.txt, Work in Progress (2001)

    Google Scholar 

  7. Nikander, P.: Denial-of-service, address ownership, and early authentication in the ipv6 world. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 2845, pp. 12–21. Springer, Heidelberg (2004)

    Google Scholar 

  8. Arkko, J., Vogt, C., Haddad, W.: Applying cryptographically generated addresses and credit-based authorization to mobile ipv6. draft-ietf-mipshop-cga-cba-00, work in progress (2006)

    Google Scholar 

  9. Aura, T.: Cryptographically generated addresses (CGA). RFC 3972 (2003), http://www.ietf.org/rfc/rfc3972.txt

  10. Haddad, W., Krishnan, S., Soliman, H.: Using cryptographically generated addresses (CGA) to secure HMIPv6 protocol (HMIPv6sec). draft-haddad-mipshop-hmipv6-security-06, work in progress (2006)

    Google Scholar 

  11. Haddad, W., Krishnan, S.: Authenticating fmipv6 handovers. draft-haddad-mipshop-fmipv6-auth-02, work in progress (2006)

    Google Scholar 

  12. IETF, MIPSHOP: Mobility for ip: Performance, signaling and handoff optimization, http://www.ietf.org/html.charters/mipshop-charter.html

  13. O’Shea, G., Roe, M.: Child-proof authentication for mipv6 (cam). ACM Computer and Communication Review 2 (2001)

    Google Scholar 

  14. Nikander, P.: A scalable architecture for ipv6 address ownership. Internet Draft, Work in Progress (2001)

    Google Scholar 

  15. Aura, T.: Cryptographically generated addresses, pp. 29–43 (2004)

    Google Scholar 

  16. Shamir, A.: Identity-based encryption from the weil pairing. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  17. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Google Scholar 

  18. Tang, W., Nan, X., Chen, Z.: Combined public key cryptosystem. In: Proceedings of International Conference on Software,Telecommunications and Computer Networks (SoftCOM’04). IEEE ComSoc., Los Alamitos (2004)

    Google Scholar 

  19. Research, C.: Standards for efficient cryptography, sec 1: Elliptic curve cryptography(2000), http://www.secg.org/download/aid-385/sec1_final.pdf

  20. Jonsson, J., Kaliski, B.: Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1. RFC 3447 (2003), http://www.ietf.org/rfc/rfc3447.txt

  21. Aura, T.: Secure neighbor discovery protocol (SEND). RFC 3971 (2003), http://www.ietf.org/rfc/rfc3971.txt

  22. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons Inc, Chichester (1996)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, Z., Deng, H., Ma, Y., Hu, P. (2007). Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics