Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
DOS-Resistant Authentication with Client Puzzles
Revised Papers from the 8th International Workshop on Security Protocols
Securing IPv6 neighbor and router discovery
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An improved address ownership in mobile IPv6
Computer Communications
Experiences with host-to-host IPsec
Proceedings of the 13th international conference on Security protocols
Enhancing privacy with shared Pseudo random sequences
Proceedings of the 13th international conference on Security protocols
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Hi-index | 0.01 |
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address configuration, neighbour detection, router discovery, and others. It is either suggested to or required that IPsec is used to secure these functions. Furthermore, IPsec is used to protect a number of functions that are considered dangerous in the IPv4 world, including mobility management and source routing. Now, the currently prominent method for creating IPsec Security Associations, the Internet Key Exchange (IKE) protocol, is both relatively heavy and requires that the underlying IP stacks are already fully functional, at least to the point that UDP may be used. As a result, the combination of the widened responsibility of IPsec and the relative heavy weight of IKE creates a vicious cycle that is a potential source of various denial-of-service attacks. Additionally, if we want to use IPsec to secure IPv6 autoconfiguration, a chicken-and-egg problem is created: fully configured IPsec is needed to configure IP, and fully configured IP is needed to configure IPsec. In this paper, we describe these problems in detail.