• Title/Summary/Keyword: MIPv6 Security

Search Result 52, Processing Time 0.025 seconds

A Study on Security Architecture for F-MIPv6 (F-HMIPv6 지원을 위한 보안 아키텍처)

  • Son, Sang-Woo;Kim, Mun-Ki;Rhee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.7-8
    • /
    • 2006
  • F-HMIPv6 is protocol that supports fast handovers for Hierarchical Mobile IPv6. Unlike HMIPv6 (Hierarchical Mobile IPv6), it sends FBU(Fast Binding Update) by predicted Router's Information for a potential handover. But, The current version of this protocol doesn't ensure impeccably between mobile node and router. To make up for the weak points of the security, we propose the architecture for F-HMIPv6 protocol to structurally reinforce the security and improve weak security of among mobile node, MAP(Mobility Anchor Point), and routers for binding update when mobile node conducts handovers.

  • PDF

Improve security of Wireless Mesh Networks (Wireless Mesh Networks의 보안 강화)

  • Park, Jin-Ho;Cho, Jae-Ik;Im, Eul-Gyu;Kim, Jung-Sik;Choi, Kyoung-Ho;Jang, Hyun-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.629-632
    • /
    • 2006
  • 기존의 무선 네트워크에 비해 빠르고 저렴하며 설치가 편리한 무선 메쉬 네트워크를 인터넷망 구성에 도입하려고 하는 것이 최근의 경향이다. 무선 메쉬 네트워크는 이종망간의 네트워크를 통합함으로 수많은 클라이언트들을 통제해야하며 기존의 IPv4 주소는 10년 내에 고갈이 됨으로, IPv6 주소 환경에 적합하게 연구 개발하여야 한다. 그러나 아직 무선 메쉬 네트워크는 개발 중인 기술로써 보완해야할 보안상의 문제점들이 발견되고 있다. 본 논문에서는 무선 메쉬 네트워크에 MIPv6를 어떻게 도입할지를 언급하고 MIPv6 도입 시에 발생하게 되는 보안상의 문제점을 SEND(SEcure Neighbor Discovery)와 MCGAs를 이용하여 해결하는 방법을 소개한다.

  • PDF

The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6 (고속의 안전한 Proxy Mobile IPv6 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.11-24
    • /
    • 2012
  • Without a proper protection mechanism for the signaling messages to be used for the mobility support in the Proxy Mobile IPv6 (PMIPv6), it is also vulnerable to several security attacks such as redirect attack, MITM (Man-In-The-Middle) attack, replay attack and DoS (Denial of Service) attack as in Mobile IPv6. In this paper, we point out some problems of previous authentication mechanisms associated with PMIPv6, and also propose a new fast and secure authentication mechanism applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

The Methods of applying IPsec between MN and HA based on Mobile IPv6 (Mobile IPv6환경에서 MN과 HA간의 IPsec 적용 방안에 관한 연구)

  • 박원주;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.241-244
    • /
    • 2003
  • Recently, IETF Mobile IP WG focus on security problem issues in Mobile IPv6 and provide appropriate protocol to solve them. These include the protections of Binding Updates both to home agents and correspondent nodes, prefix discovery messages and transporting data packets. In Mobile IPv6, control traffics between home agents and mobile nodes uses IPsec to avoid that mobile nodes and correspondent nodes may be vulnerable to attacks. It is used, however, Return Routability procedure for correspondent node to assure that the right mobile node is sending the messages. In this paper, we propose method of IPser processing to protect messages between home agents and mobile nodes.

  • PDF

State of Art on Security Protocols for Fast Mobile IPv6 (고속의 이동 IPv6를 위한 보안 프로토콜 연구)

  • You, Il-Sun;Hori, Yoshiaki;Sakurai, Kouichi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.121-134
    • /
    • 2010
  • With the help of various Layer 2 triggers, Fast Handover for Mobile IPv6 (FMIPv6) considerably reduces the latency and the signaling messages incurred by the handover. Obviously, if not secured, the protocol is exposed to various security threats and attacks. In order to protect FMIPv6, several security protocols have been proposed. To our best knowledge, there is lack of analysis and comparison study on them though the security in FMIPv6 is recognized to be important. Motivated by this, we provide an overview of the security protocols for FMIPv6, followed by the comparison analysis on them. Also, the security threats and requirements are outlined before the protocols are explored. The comparison analysis result shows that the protocol presented by You, Sakurai and Hori is more secure than others while not resulting in high computation overhead. Finally, we introduce Proxy MIPv6 and its fast handover enhancements, then emphasizing the need for a proper security mechanism for them as a future work.

Integrated Hospital Information System with IPv6 for Ubiquitous Healthcare Environment

  • Kwock, DongYeup;Moon, KangNam;Lee, JeongHoon;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1030-1034
    • /
    • 2009
  • IPv6 and Ubiquitous Healthcare Environment (UHE) has become a main stream of the next generation technologies. IPv6 is designed in many ways with enhanced features such as a routing, mobility, scalability, QOS and security as a replacement of IPv4. Also, UHE is developed to provide patients with convenience and efficient healthcare services using the remote home healthcare system. However, IPv4 currently used as an Internet protocol does not have enough capability to fully support UHE. It may result in a restricted implementation of UHE. As a result, research on IPv6 implementations in UHE is increasingly becoming an issue within the healthcare industry. IPv6 has enhanced features to implement the remote healthcare system such as Neighbour Discovery process and address auto-configuration. In this paper, a basic of IPv6 and UHE will be firstly introduced and secondly, benefits brought by IPv6 in UHE will be discussed. In addition, security issues in IPv6 will be analysed to conclude this paper.

  • PDF

Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management (호스트 기반 분산형 이동성 관리 기술에서 안전하고 효과적인 바인딩 업데이트)

  • Lee, Seyeong;Choi, Hyoung-Kee;Kim, EJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.397-408
    • /
    • 2017
  • As mobile traffic increases rapidly, DMM (Distributed Mobility Management) has been proposed as a mobility management technology for seamless communication of mobile devices as mobile traffic increases rapidly. the DMM distributes mobility management from the core network to the edge network, enabling stable binding updates with low latency. However, the DMM still have network delay and security problems for sessions. In this paper, we point out the problems existing in the DMM and propose a new protocol in which the MN (Mobile Node) directly participates in authentication and mutual authentication is correctly performed to solve this problem. We demonstrate not only security improvements but also performance improvements with performance analysis.

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

Proxy-AAA Authentication Scheme with Forwarding Mode Supporting in PMIPv6 Networks

  • Han, JeongBae;Jeong, Jongpil;Jo, Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.18-22
    • /
    • 2013
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.