SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
An improved address ownership in mobile IPv6
Computer Communications
Security against DOS attack in mobile IP communication
Proceedings of the 2nd international conference on Security of information and networks
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
A lightweight fast handover authentication scheme in mobile networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
MIPv6 binding update protocol secure against both redirect and dos attacks
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A new authentication scheme of binding update protocol on handover in mobile IPv6 networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Improving the CGA-OMIPv6 protocol for low-power mobile nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Hi-index | 0.00 |
The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a mobile node constantly inform its correspondent nodes about its new care-of addresses by sending them binding update messages. Unauthenticated or malicious binding updates open the door for intruders to perform redirect attacks, i.e., malicious acts which redirect traffic from correspondent nodes to locations chosen by intruders. How to protect binding update messages to defend against redirect attacks is a challenging problem given the open environment in which MIPv6 operates. In this paper, we first look at two solutions proposed by the IETF Mobile IP Working Group and point out their weaknesses. We then present a new protocol for securing binding update messages. We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment.