Abstract
Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols for securing Binding Update, and compared their security features. We proposed one approach based on BAN logic, a famous formal method has been successfully used in several projects, with extended rules and definitions that are capable of specifying security properties and goals of these protocols. Finally, and the effectiveness of this approach was demonstrated. We hope these works can contribute to the ongoing design and deployment of MIPv6 and pave the way for future research in the security evaluation of MIPv6.
This work is supported by the National Natural Science Foundation of China under Grant 91412011.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perkins, C.: IP mobility support. IETF RFC, RFC 2002 (1996), http://www.ietf.org/rfc/
Johnson, D., Perkins, C., Arkko, J.: IETF RFC 3775, Mobility Support in IPv6 (2004)
Arkko, J., Devarapalli, V., Dupont, F.: IETF RFC 3776, Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents (2004)
Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose-Built Keys (PBK) (2003), draft-bradner-pbk-frame-06.txt,IETF, http://www.ietf.org/internet-drafts/draft-bradner-pbk-frame-06.txt
O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)
Xiao, H.: Trust Management for Mobile IPv6 Binding Update. In: Proceedings of the International Conference on Security and Management, SAM 2003, Las Vegas, June 23-26 (2003)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A 426, 233–271 (1989)
Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 215–234. Springer, Heidelberg (2004)
Nikander, P., Arkko, J., Aura, T., Montenegro, G.: Mobile IP version 6 (MIPv6) Route Optimization Security Design. In: Proc. IEEE Vehicular Technology Conference Fall 2003, Orlando, FL USA. IEEE Press, Los Alamitos (2003)
Arkko, J., Nikander, P.: Limitations of IPsec Policy Mechanisms. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 241–251. Springer, Heidelberg (2005)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Jx., Huai, Jp., Li, Q., Li, Xx. (2005). Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_105
Download citation
DOI: https://doi.org/10.1007/11599463_105
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30856-0
Online ISBN: 978-3-540-32276-4
eBook Packages: Computer ScienceComputer Science (R0)