[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

Abstract

Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols for securing Binding Update, and compared their security features. We proposed one approach based on BAN logic, a famous formal method has been successfully used in several projects, with extended rules and definitions that are capable of specifying security properties and goals of these protocols. Finally, and the effectiveness of this approach was demonstrated. We hope these works can contribute to the ongoing design and deployment of MIPv6 and pave the way for future research in the security evaluation of MIPv6.

This work is supported by the National Natural Science Foundation of China under Grant 91412011.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Perkins, C.: IP mobility support. IETF RFC, RFC 2002 (1996), http://www.ietf.org/rfc/

  2. Johnson, D., Perkins, C., Arkko, J.: IETF RFC 3775, Mobility Support in IPv6 (2004)

    Google Scholar 

  3. Arkko, J., Devarapalli, V., Dupont, F.: IETF RFC 3776, Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents (2004)

    Google Scholar 

  4. Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose-Built Keys (PBK) (2003), draft-bradner-pbk-frame-06.txt,IETF, http://www.ietf.org/internet-drafts/draft-bradner-pbk-frame-06.txt

  5. O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)

    Google Scholar 

  6. Xiao, H.: Trust Management for Mobile IPv6 Binding Update. In: Proceedings of the International Conference on Security and Management, SAM 2003, Las Vegas, June 23-26 (2003)

    Google Scholar 

  7. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A 426, 233–271 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  8. Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 215–234. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Nikander, P., Arkko, J., Aura, T., Montenegro, G.: Mobile IP version 6 (MIPv6) Route Optimization Security Design. In: Proc. IEEE Vehicular Technology Conference Fall 2003, Orlando, FL USA. IEEE Press, Los Alamitos (2003)

    Google Scholar 

  10. Arkko, J., Nikander, P.: Limitations of IPsec Policy Mechanisms. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 241–251. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Jx., Huai, Jp., Li, Q., Li, Xx. (2005). Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_105

Download citation

  • DOI: https://doi.org/10.1007/11599463_105

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30856-0

  • Online ISBN: 978-3-540-32276-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics