Credit-Based Authorization for Concurrent IP-Address Tests

نویسنده

  • Christian Vogt
چکیده

Route optimization enables mobile nodes to directly communicate with one another. This is an important efficiency benefit of modern mobility protocols like Mobile IPv6 or the Host Identity Protocol. However, route optimization can introduce the possibility for a new type of amplified flooding attacks if designed without care: An attacker may misuse the protocol to trick its peer into redirecting a flow of packets to a false, i.e., a victim’s, IP address. A precautionary counter-measure used by various mobility protocols is to first determine whether the right node is present at a new IP address before any data packets are sent to that address. The test can be as simple as a ping carrying some unguessable, to-be-returned piece of data. Yet, an unfortunate side effect of this common approach is that it increases handover latency by one round-trip time, precluding interactive or real-time applications in many scenarios. This paper proposes a credit-based strategy that allows peers to continue communications while a new IP address is being examined. The optimization is exemplarily applied to Mobile IPv6 and the Host Identity Protocol, for which it reduces handover-signaling delays by 50%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Internet Authorization Scheme Using Smart-Card-Based Security Kernels

Today, most Internet applications are based on the client-server model. In this model, typically, the server distrusts clients, and grants each client access rights according to the client’s identity. This enables the server to record a lot of personal information about clients: identity, usual IP address, postal address, credit card number, purchase habits, etc. Such a model is thus necessaril...

متن کامل

Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication

In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user’s account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control ...

متن کامل

A Secure Route Optimization Protocol in Mobile IPV6 D.Kavitha

Mobile IPV6 allows a mobile node to talk directly to its peers while retaining the ability to move around and change the currently used IP addresses. This mode of operation is called Route Optimization. In this method , the correspondent node learns a binding between the Mobile nodes permanent home address and its current temporary care-of-address. This introduces several security vulnerabiliti...

متن کامل

Authentication tests and disjoint encryption: A design method for security protocols

We describe a protocol design process, and illustrate its use by creating atspect, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined wit...

متن کامل

A Fast and Secure Method for Anonymizing Packet Traffic and Call Traces

Various kinds of traffic traces, containing, e.g., packet headers, signaling messages, or authorization log-files, are needed to examine the status and performance of packet switching networks. In most cases, traces contain information that can be used identify subscribers and what kind of services they have been using. This kind of information can be usually handled only by network operator an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005