Defending against redirect attacks in mobile IP

The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a...

Full description

Saved in:
Bibliographic Details
Main Authors: DENG, Robert H., ZHOU, Jianying, BAO, Feng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2002
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1100
https://ink.library.smu.edu.sg/context/sis_research/article/2099/viewcontent/DefendingRedirectAttacksMobileIP_2002.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2099
record_format dspace
spelling sg-smu-ink.sis_research-20992016-05-11T15:57:53Z Defending against redirect attacks in mobile IP DENG, Robert H. ZHOU, Jianying BAO, Feng The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a mobile node constantly inform its correspondent nodes about its new care-of addresses by sending them binding update messages. Unauthenticated or malicious binding updates open the door for intruders to perform redirect attacks, i.e., malicious acts which redirect traffic from correspondent nodes to locations chosen by intruders. How to protect binding update messages to defend against redirect attacks is a challenging problem given the open environment in which MIPv6 operates. In this paper, we first look at two solutions proposed by the IETF Mobile IP Working Group and point out their weaknesses. We then present a new protocol for securing binding update messages. We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment. 2002-11-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1100 info:doi/10.1145/586110.586120 https://ink.library.smu.edu.sg/context/sis_research/article/2099/viewcontent/DefendingRedirectAttacksMobileIP_2002.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University mobile IP security authenticated key-exchange mobile IP secure binding update redirect attack Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic mobile IP security
authenticated key-exchange
mobile IP
secure binding update
redirect attack
Information Security
spellingShingle mobile IP security
authenticated key-exchange
mobile IP
secure binding update
redirect attack
Information Security
DENG, Robert H.
ZHOU, Jianying
BAO, Feng
Defending against redirect attacks in mobile IP
description The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a mobile node constantly inform its correspondent nodes about its new care-of addresses by sending them binding update messages. Unauthenticated or malicious binding updates open the door for intruders to perform redirect attacks, i.e., malicious acts which redirect traffic from correspondent nodes to locations chosen by intruders. How to protect binding update messages to defend against redirect attacks is a challenging problem given the open environment in which MIPv6 operates. In this paper, we first look at two solutions proposed by the IETF Mobile IP Working Group and point out their weaknesses. We then present a new protocol for securing binding update messages. We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment.
format text
author DENG, Robert H.
ZHOU, Jianying
BAO, Feng
author_facet DENG, Robert H.
ZHOU, Jianying
BAO, Feng
author_sort DENG, Robert H.
title Defending against redirect attacks in mobile IP
title_short Defending against redirect attacks in mobile IP
title_full Defending against redirect attacks in mobile IP
title_fullStr Defending against redirect attacks in mobile IP
title_full_unstemmed Defending against redirect attacks in mobile IP
title_sort defending against redirect attacks in mobile ip
publisher Institutional Knowledge at Singapore Management University
publishDate 2002
url https://ink.library.smu.edu.sg/sis_research/1100
https://ink.library.smu.edu.sg/context/sis_research/article/2099/viewcontent/DefendingRedirectAttacksMobileIP_2002.pdf
_version_ 1770570854598443008