Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method
نویسندگان
چکیده
Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols for securing Binding Update, and compared their security features. We proposed one approach based on BAN logic, a famous formal method has been successfully used in several projects, with extended rules and definitions that are capable of specifying security properties and goals of these protocols. Finally, and the effectiveness of this approach was demonstrated. We hope these works can contribute to the ongoing design and deployment of MIPv6 and pave the way for future research in the security evaluation of MIPv6.
منابع مشابه
Dual Identity Return Routability for the Security of Mobile Ipv6 Binding Updates within the Distributed Authentication Protocol
The future fourth generation 4G networks will provide us with a paradigm shift in how mobile telecommunications will operate. It will be solely based on packet switching using mobile IPv6. However binding update route optimisation is vulnerable to a variety of security attacks. This paper attempts to reduce the security vulnerabilities by creating a new security protocol by first investigating ...
متن کاملSecuring Binding Updates in Routing Optimizaton of Mobile IPv6
Mobile IPv6 (mipv6) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from Correspondent Node (CN) to a Mobile Node (MN) go first through the mobile node’s Home Agent (HA). Then the HA tunnels them to the MN’s foreign network. This process of delivering the...
متن کاملAn Efficient Hierarchical Certificate Based Binding Update Protocol for Route Optimization in Mobile IPv6
Most of the proposed security protocols for routing optimization in Mobile IPv6, including the one in the standard, depend on the special relationship between the home network and the mobile node. In this paper, we present a new protocol that does not depend on the security relationship between the home network and the mobile. The security of the protocol is analyzed and its performance evaluat...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005