Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
An Efficient MIPv6 Return Routability Scheme Based on Geometric Computing

Authors: Yen-Cheng Chen, Fu-Chen Yang

Abstract:

IETF defines mobility support in IPv6, i.e. MIPv6, to allow nodes to remain reachable while moving around in the IPv6 internet. When a node moves and visits a foreign network, it is still reachable through the indirect packet forwarding from its home network. This triangular routing feature provides node mobility but increases the communication latency between nodes. This deficiency can be overcome by using a Binding Update (BU) scheme, which let nodes keep up-to-date IP addresses and communicate with each other through direct IP routing. To further protect the security of BU, a Return Routability (RR) procedure was developed. However, it has been found that RR procedure is vulnerable to many attacks. In this paper, we will propose a lightweight RR procedure based on geometric computing. In consideration of the inherent limitation of computing resources in mobile node, the proposed scheme is developed to minimize the cost of computations and to eliminate the overhead of state maintenance during binding updates. Compared with other CGA-based BU schemes, our scheme is more efficient and doesn-t need nonce tables in nodes.

Keywords: Mobile IPv6, Binding update, Geometric computing.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1057491

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1079

References:


[1] D. Johnson, C. Perkins, J. Arkko, "Mobility Support in IPv6," Request for comments 3775, IETF, June 2004
[2] Feng Yong, Wu Zhongfu, Zhong Jiang, Ye Chunxiao, Wu Kaigui, "A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6," International Conference on Networking, Architecture, and Storage
[3] Fu-Chen Yang, Yen-Cheng Chen, "A stateless Return Routability Scheme in Mobile IPv6," International Conference on E-Business and Information System Security 2009, IEEE, Wuhan, China
[4] M. Roe, T. Aura, G.O-Shea, J. Arkko, "Authentication of Mobile IPv6 Binding Updates and Acknowledgements", IETF internet draft, February 2002
[5] Tuomas Aura, Michael Roe, "Designing the Mobile IPv6 Security Protocol," Technical Report, April 2006.
[6] T. Aura, "Cryptographically generated addresses(CGA)," Request for Comments 3972, IETF, 2005.
[7] Kui Ren, Wenjing Jou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng, "Routing optimization security in mobile IPv6," Computer Network, 2006, pp: 2401-2419
[8] Khaled Elgoarany, Mohamed Eltoweissy, "Security in Mobile IPv6: A survey," Information Security Technical Report, ELSEVIER, March 2007.
[9] Ruidong Li, Jie Li, Kui Wu, Yang Xiao, Jiang Xie, "An Enhanced Fast handover with Low Latency for Mobile IPv6," IEEE Transaction on Wireless Communications, Vol. 7, No. 1, Jan 2008
[10] Warodom Werapun, Apinetr Unakul, "Secure Mobile IPv6 Binding Updates with Identiy-based Signature," international conference on Electronics Packaging, Jan 2004
[11] Jung-Doo Koo, Dong-Chun Lee, "Extended Ticket-based Binding Update(ETBU) Protocol for Mobile IPv6(MIPv6) Networks," IEICE TRANS. COMMUN., VOL.E90-B, NO. 4, APRIL 2007
[12] Tzong-Chen Wu, "Remote login authentication scheme based on a geometric approach," Computer Communications, Vol 18, No. 12. december 1995
[13] Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng, "A modified remote login authentication scheme based on geometric approach" The journal of Systems and Software 55, 2001 (287-290)