DOI QR코드

DOI QR Code

A Study on Improving the Subsequent Phase of OMIPv6 Protocol Series

MIPv6 최적화 프로토콜 시리즈의 후속 단계 개선 연구

  • 유일선 (한국성서대학교 정보과학부) ;
  • 김흥준 (진주산업대학교 컴퓨터공학과)
  • Published : 2007.11.30

Abstract

Recently, OMIPv6 series, based on public-key cryptography, have been proposed to improve RR protocol. This series no typically composed of the initial and subsequent phases. In the initial phase, the mobile node and its corresponding node build a strong long-term key, by which successive binding updates are optimized in the subsequent phase. In this paper, we compare and analyze the subsequent phases of OMIPv6 series in terms of performance, security and applicability, then presenting an improvement on the subsequent phase. Also, we show that the proposed improvement is reasonable considering performance, security and applicability overall.

최근에 RR(Return Routability) 프로토콜을 개선하기 위해 공개키 기반의 OMIPv6 시리즈가 제안되었다. OMIPv6 시리즈는 강력한 장기키(long-term key)를 생성하는 초기 단계와 장기키를 바탕으로 이후의 바인딩 갱신 과정을 최적화 하는 후속 단계로 구성된다. 본 논문에서는 OMIPv6 시리즈의 후속 단계를 성능과 보안성, 적용성 측면에서 비교 분석한 후, 비교 분석 결과에 근거하여 개선안을 제시한다. 또한, 제안한 개선안이 성능과 보안성, 적용성을 전체적으로 고려할 때 다른 프로토콜에 비해 우수함을 보인다.

Keywords

References

  1. D. Johnson, C. Perkins and J. Arkko, 'Mobility Support in IPv6,' RFC 3775, June 2004
  2. I. You, J. Lim, 'Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices,' UMS 2007, Springer-Verlag LNCS 4352, Part II, pp. 479-486, Jan. 2007
  3. W. Haddad, F. Dupont, L. Madour, S. Krishnan and S. Park, 'Optimizing Mobile IPv6 (OMIPv6),' draft-haddad-mipv6-omipv6-01.txt, Feb. 2004 (Work in progress)
  4. W. Haddad, L. Madour, J. Arkko and F. Dupont. 'Applying Cryptographically Generated Addresses to Optimize MIPv6 (CGA-OMIPv6),' draft-haddad-mip6- cga-omipv6-04, May 2005 (Workin progress)
  5. J. Arkko, C. Vogt and W. Haddad, 'Applying Cryptographically Generated Addresses and Credit-Based Authorization to Mobile IPv6,' draft-arkko-mipshop-cga-cba-04.txt, June 2006(Work in progress)
  6. F. Dupont and W. Haddad, 'Optimizing Mobile IPv6 (OMIPv6),' draft-dupont-mipshop-omipv6-00.txt, Feb. 2006(Workin progress)
  7. I. You, 'Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes,' ICCSA 2006, Springer-Verlag LNCS 3938,pp.336-343, May 2006
  8. S. Bradner, A. Mankin and J. Schiller, 'A Framework for Purpose-Built Keys (PBK),' draft-bradner-pbk-frame- 06.txt, Oct. 2003 (Work in progress)
  9. T. Aura, 'Cryptographically Generated Addresses (CGA),' RFC 3972, March 2005
  10. R. Deng, J. Zhou, and F. Bao, 'Defending Against Redirect attacks in Mobile IP,' Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov. 2002