DOI QR코드

DOI QR Code

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression

  • Wu, Tin-Yu (Department of Electrical Engineering, Tamkang University) ;
  • Chao, Han-Chieh (Institute of Computer Science & Information Engineering and Department of Electronic Engineering, National Ilan University) ;
  • Lo, Chi-Hsiang (Institute of Computer Science & Information Engineering and Department of Electronic Engineering, National Ilan University)
  • Published : 2009.09.30

Abstract

By providing ubiquitous Internet connectivity, wireless networks offer more convenient ways for users to surf the Internet. However, wireless networks encounter more technological challenges than wired networks, such as bandwidth, security problems, and handoff latency. Thus, this paper proposes new technologies to solve these problems. First, a Security Access Gateway (SAG) is proposed to solve the security issue. Originally, mobile terminals were unable to process high security calculations because of their low calculating power. SAG not only offers high calculating power to encrypt the encryption demand of SAG's domain, but also helps mobile terminals to establish a multiple safety tunnel to maintain a secure domain. Second, Robust Header Compression (RoHC) technology is adopted to increase the utilization of bandwidth. Instead of Access Point (AP), Access Gateway (AG) is used to deal with the packet header compression and de-compression from the wireless end. AG's high calculating power is able to reduce the load on AP. In the original architecture, AP has to deal with a large number of demands by header compression/de-compression from mobile terminals. Eventually, wireless networks must offer users "Mobility" and "Roaming". For wireless networks to achieve "Mobility" and "Roaming," we can use Mobile IPv6 (MIPv6) technology. Nevertheless, such technology might cause latency. Furthermore, how the security tunnel and header compression established before the handoff can be used by mobile terminals handoff will be another great challenge. Thus, this paper proposes to solve the problem by using Early Binding Updates (EBU) and Security Access Gateway (SAG) to offer a complete mechanism with low latency, low handoff mechanism calculation, and high security.

Keywords

References

  1. Brower E., Ertekin E., Christou C.A., O'Keefe S., “The Application of Header Compression to IPsec Encrypted Networks”, Military Communications Conference, 2005. MILCOM 2005. Vol. 5, pp. 2844- 2850, IEEE 17-20 Oct. 2005 https://doi.org/10.1109/MILCOM.2005.1606095
  2. Chen Zhuo, Chen Xiao-Wei, Zhang Zheng-Wen, Yang Mu-Xiang, “The Improving of IKE in WLAN”, Wireless Communications, Networking and Mobile Computing 2005. Proceedings. 2005 International Conference, Vol. 2, 23-26, pp. 1128-1131, Sept. 2005 https://doi.org/10.1109/WCNM.2005.1544251
  3. Christian Vogt, Roland Bless, Mark Doll, Tobias Kuefner, “Early Binding Updates for Mobile IPv6”, Wireless Communications and Networking Conference, 2005 IEEE, Vol. 3, 13-17, pp. 1440-1445, Mar. 2005 https://doi.org/10.1109/WCNC.2005.1424727
  4. C. Vogt, J. Arkko, R. Bless, M. Doll, and T. Kuefner., “Early Binding Updates for Mobile IPv6”, Internet Draft draft-vogt-mip6-early-binding-updates, Feb. 2004 https://doi.org/10.1109/WCNC.2005.1424727
  5. C. Vogt, J. Arkko, R. bless, M. Doll, and T. Kuefner., “Credit-Based Authorization for Mobile IPv6 Early Binding Updates”, Internet Draft draft-ietf-send-cga, May. 2004
  6. C. Bormann, C, Burmeister, M. Degermark, “RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed”, RFC 3095, July. 2001
  7. Changwen Liu, Soliman, H., “Local Key Exchange for Mobile IPv6 Local Binding Security Association”, Vehicular Technology Conference, 2004. VTC 2004- Spring. 2004 IEEE 59th, Vol. 5, 17-19, pp. 2647- 2655, May. 2004 https://doi.org/10.1109/VETECS.2004.1391401
  8. Chin-Fu Kuo, Chi-Ying Chen, Chi-Sheng Shih, Tei- Wei Kuo, “Threat-Based Configuration Architecture for Security Gateways”, Networks, 2006. ICON '06. 14th IEEE International Conference, Vol. 1, pp. 1-6, Sept. 2006 https://doi.org/10.1109/ICON.2006.302564
  9. Chih-Mou Shih, Shang-Juh Kao, “Security Gateway for Accessing IPv6 WLAN”, Computer and Information Science, 2006. ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference, pp. 83-88, July. 10-12, 2006 https://doi.org/10.1109/ICIS-COMSAR.2006.76
  10. C. Bormann, “Robust Header Compression (ROHC) over PPP” RFC 3241, Apr. 2002
  11. D. Taylor, A. Herkersdorf, A. Doring, G. Dittmann, “Robust Header Compression (RoHC) in Next-Generation Network Processors”, IEEE/ACM Transactions on Networking, Vol. 13, NO. 4, Aug. 2005 https://doi.org/10.1109/TNET.2005.852887
  12. D. Harkins and D. Carrel, “The Internet Key Exchange Protocol”, IETF RFC 2409, 1998
  13. D. Johnson, C. E. Perkins, and J. Arkko., “Mobility Support in IPv6”, RFC 3775, June. 2004
  14. E. Ertekin, C. Christou, B. Allen Hamilton, “Internet Protocol Header Compression, Robust Header Compression, and Their Applicability in the Global Information Grid”, IEEE Communication Magazine, Nov. 2004 https://doi.org/10.1109/MCOM.2004.1362553
  15. E. Martinez, A. Minaburo, L. Toutain, “RoHC for Multicast Distribution Services”, IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, 2005 https://doi.org/10.1109/PIMRC.2005.1651702
  16. Eltoweissy, M., Moharrum, M., Mukkamala, R., “Dynamic key management in sensor networks”, Communications Magazine, IEEE, Vol. 44, Issue 4, pp. 122-130, Apr. 2006 https://doi.org/10.1109/MCOM.2006.1632659
  17. G. O'Shea and M. Roe, “Child-Proof Authentication for MIPv6 (CAM)”, SIGCOMM Comput. Commun. Rev., Vol. 31, NO. 2, pp. 4-8, 2001 https://doi.org/10.1145/505666.505668
  18. J. Vilhuber, “IP Header Compression in IPSec ES”, Internet draft, draft-vilhuber-hcoesp-01.txt, July. 2004
  19. R. Deng, J. Zhou, and F. Bao, “Defending against Redirect Attacks in Mobile IP”, Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, pp. 59-67, Washington, DC, Nov. 2002 https://doi.org/10.1145/586110.586120
  20. Tin-Yu Wu, Chi-Hsiang Lo and Han-Chieh Chao, “Early Security Key Exchange for Encryption in Mobile IPv6 Handoff”, Security and Communication Networks, Volume 1 Issue 6, pp. 511–520, October. 2008 https://doi.org/10.1002/sec.62

Cited by

  1. Improved IPsec performance utilizing transport-layer-aware compression architecture vol.4, pp.9, 2011, https://doi.org/10.1002/sec.257
  2. SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks vol.7, pp.1, 2013, https://doi.org/10.1109/JSYST.2012.2209276