Security of Route Optimization in Mobile IPv6 Networks

碩士 === 國立暨南國際大學 === 資訊管理學系 === 97 === Many wireless applications and mobile communication services are provided through IP networks. This brings the increased popularity of mobile users, but also introduces the problems of IP address shortage and demands for mobility support in IP networks. Therefor...

Full description

Bibliographic Details
Main Authors: Fu-Chen Yang, 楊富丞
Other Authors: Yen-Cheng Chen
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/58583980722893404099
id ndltd-TW-097NCNU0396049
record_format oai_dc
spelling ndltd-TW-097NCNU03960492016-05-06T04:11:29Z http://ndltd.ncl.edu.tw/handle/58583980722893404099 Security of Route Optimization in Mobile IPv6 Networks 行動IPv6網路路由最佳化安全性之研究 Fu-Chen Yang 楊富丞 碩士 國立暨南國際大學 資訊管理學系 97 Many wireless applications and mobile communication services are provided through IP networks. This brings the increased popularity of mobile users, but also introduces the problems of IP address shortage and demands for mobility support in IP networks. Therefore, IETF defines mobility support in IPv6, i.e. MIPv6, to allow nodes to remain reachable while moving around in the IPv6 internet. When a node moves and visits a foreign network, it is still reachable through the indirect packet forwarding from its home network. This triangular routing feature provides node mobility but increases the communication latency between nodes. In order to further eliminate triangular routing, IETF proposes a binding update (BU) scheme, which enables nodes communicate directly. This process of enabling direct packet delivering is called Route Optimization. To protect the security of BU message, a Return Routability (RR) procedure was proposed. However, it was found that RR is vulnerable to many attacks. In this thesis, we consider two different mobile IPv6 authentication architectures and propose two securing Binding Update message schemes for each architecture. In the infrastructureless environment, neither trusted third party nor certificate authority exists. We adopt CGA (Cryptographic Generated Address) scheme to propose two solutions based on Diffie Hellman key agreement and geometric computation respectively. In the infrastructure environment, there exists a third-party trusted Certificate Authority (CA) and different AAA servers, which also behave as PKGs (private key generators), distributed in different network domains. According to distinct privacy requirements, we present two secure BU schemes, adopting ID-based multi-signature and encryption respectively across multi-PKGs. Yen-Cheng Chen 陳彥錚 2009 學位論文 ; thesis 58 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立暨南國際大學 === 資訊管理學系 === 97 === Many wireless applications and mobile communication services are provided through IP networks. This brings the increased popularity of mobile users, but also introduces the problems of IP address shortage and demands for mobility support in IP networks. Therefore, IETF defines mobility support in IPv6, i.e. MIPv6, to allow nodes to remain reachable while moving around in the IPv6 internet. When a node moves and visits a foreign network, it is still reachable through the indirect packet forwarding from its home network. This triangular routing feature provides node mobility but increases the communication latency between nodes. In order to further eliminate triangular routing, IETF proposes a binding update (BU) scheme, which enables nodes communicate directly. This process of enabling direct packet delivering is called Route Optimization. To protect the security of BU message, a Return Routability (RR) procedure was proposed. However, it was found that RR is vulnerable to many attacks. In this thesis, we consider two different mobile IPv6 authentication architectures and propose two securing Binding Update message schemes for each architecture. In the infrastructureless environment, neither trusted third party nor certificate authority exists. We adopt CGA (Cryptographic Generated Address) scheme to propose two solutions based on Diffie Hellman key agreement and geometric computation respectively. In the infrastructure environment, there exists a third-party trusted Certificate Authority (CA) and different AAA servers, which also behave as PKGs (private key generators), distributed in different network domains. According to distinct privacy requirements, we present two secure BU schemes, adopting ID-based multi-signature and encryption respectively across multi-PKGs.
author2 Yen-Cheng Chen
author_facet Yen-Cheng Chen
Fu-Chen Yang
楊富丞
author Fu-Chen Yang
楊富丞
spellingShingle Fu-Chen Yang
楊富丞
Security of Route Optimization in Mobile IPv6 Networks
author_sort Fu-Chen Yang
title Security of Route Optimization in Mobile IPv6 Networks
title_short Security of Route Optimization in Mobile IPv6 Networks
title_full Security of Route Optimization in Mobile IPv6 Networks
title_fullStr Security of Route Optimization in Mobile IPv6 Networks
title_full_unstemmed Security of Route Optimization in Mobile IPv6 Networks
title_sort security of route optimization in mobile ipv6 networks
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/58583980722893404099
work_keys_str_mv AT fuchenyang securityofrouteoptimizationinmobileipv6networks
AT yángfùchéng securityofrouteoptimizationinmobileipv6networks
AT fuchenyang xíngdòngipv6wǎnglùlùyóuzuìjiāhuàānquánxìngzhīyánjiū
AT yángfùchéng xíngdòngipv6wǎnglùlùyóuzuìjiāhuàānquánxìngzhīyánjiū
_version_ 1718261240580538368