Security of Internet Location Management

  • Authors:
  • Tuomas Aura;Michael Roe;Jari Arkko

  • Affiliations:
  • -;-;-

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the Mobile IPv6 protocol, the mobile node sendsbinding updates to its correspondents to inform themabout its current location. It is well-known that the originof this location information must be authenticated. Thispaper discusses several threats created by locationmanagement that go beyond unauthentic location data. Inparticular, the attacker can redirect data to bomb thirdparties and induce unnecessary authentication. Weintroduce and analyze protection mechanisms with focuson ones that work for all Internet nodes and do not need aPKI or other new security infrastructure. Our threatanalysis and assessment of the defense mechanismsformed the basis for the design of a secure locationmanagement protocol for Mobile IPv6. Many of the samethreats should be considered when designing any locationmanagement mechanism for open networks.