Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method

نویسندگان

  • Jianxin Li
  • Jinpeng Huai
  • Qin Li
  • Xianxian Li
چکیده

Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols for securing Binding Update, and compared their security features. We proposed one approach based on BAN logic, a famous formal method has been successfully used in several projects, with extended rules and definitions that are capable of specifying security properties and goals of these protocols. Finally, and the effectiveness of this approach was demonstrated. We hope these works can contribute to the ongoing design and deployment of MIPv6 and pave the way for future research in the security evaluation of MIPv6.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dual Identity Return Routability for the Security of Mobile Ipv6 Binding Updates within the Distributed Authentication Protocol

The future fourth generation 4G networks will provide us with a paradigm shift in how mobile telecommunications will operate. It will be solely based on packet switching using mobile IPv6. However binding update route optimisation is vulnerable to a variety of security attacks. This paper attempts to reduce the security vulnerabilities by creating a new security protocol by first investigating ...

متن کامل

Securing Binding Updates in Routing Optimizaton of Mobile IPv6

Mobile IPv6 (mipv6) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from Correspondent Node (CN) to a Mobile Node (MN) go first through the mobile node’s Home Agent (HA). Then the HA tunnels them to the MN’s foreign network. This process of delivering the...

متن کامل

An Efficient Hierarchical Certificate Based Binding Update Protocol for Route Optimization in Mobile IPv6

Most of the proposed security protocols for routing optimization in Mobile IPv6, including the one in the standard, depend on the special relationship between the home network and the mobile node. In this paper, we present a new protocol that does not depend on the security relationship between the home network and the mobile. The security of the protocol is analyzed and its performance evaluat...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005