首页> 外文OA文献 >A security protocol for authentication of binding updates in Mobile IPv6
【2h】

A security protocol for authentication of binding updates in Mobile IPv6

机译:用于在移动Ipv6中验证绑定更新的安全协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Wireless communication technologies have come along way, improving with every generational leap. As communications evolve so do the system architectures, models and paradigms. Improvements have been seen in the jump from 2G to 3G networks in terms of security. Yet these issues persist and will continue to plague mobile communications into the leap towards 4G networks if not addressed. 4G will be based on the transmission of Internet packets only, using an architecture known as mobile IP. This will feature many advantages, however security is still a fundamental issue to be resolved. One particular security issue involves the route optimisation technique, which deals with binding updates. This allows the corresponding node to by-pass the home agent router to communicate directly with the mobile node. There are a variety of security vulnerabilities with binding updates, which include the interception of data packets, which would allow an attacker to eavesdrop on its contents, breaching the users confidentiality, or to modify transmitted packets for the attackers own malicious purposes. Other possible vulnerabilities with mobile IP include address spoofing, redirection and denial of service attacks. For many of these attacks, all the attacker needs to know is the IPv6 addresses of the mobile's home agent and the corresponding node. There are a variety of security solutions to prevent these attacks from occurring. Two of the main solutions are cryptography and authentication. Cryptography allows the transmitted data to be scrambled in an undecipherable way resulting in any intercepted packets being illegible to the attacker. Only the party possessing the relevant key will be able to decrypt the message. Authentication is the process of verifying the identity of the user or device one is in communication with. Different authentication architectures exist however many of them rely on a central server to verify the users, resulting in a possible single point of attack. Decentralised authentication mechanisms would be more appropriate for the nature of mobile IP and several protocols are discussed. However they all posses' flaws, whether they be overly resource intensive or give away vital address data, which can be used to mount an attack. As a result location privacy is investigated in a possible attempt at hiding this sensitive data. Finally, a security solution is proposed to address the security vulnerabilities found in binding updates and attempts to overcome the weaknesses of the examined security solutions. The security protocol proposed in this research involves three new security techniques. The first is a combined solution using Cryptographically Generated Addresses and Return Routability, which are already established solutions, and then introduces a new authentication procedure, to create the Distributed Authentication Protocol to aid with privacy, integrity and authentication. The second is an enhancement to Return Routability called Dual Identity Return Routability, which provides location verification authentication for multiple identities on the same device. The third security technique is called Mobile Home Agents, which provides device and user authentication while introducing location privacy and optimised communication routing. All three security techniques can be used together or individually and each needs to be passed before the binding update is accepted. Cryptographically Generated Addresses asserts the users ownership of the IPv6 address by generating the interface identifier by computing a cryptographic one-way hash function from the users' public key and auxiliary parameters. The binding between the public key and the address can be verified by recomputing the hash value and by comparing the hash with the interface identifier. This method proves ownership of the address, however it does not prove the address is reachable. After establishing address ownership, Return Routability would then send two security tokens to the mobile node, one directly and one via the home agent. The mobile node would then combine them together to create an encryption key called the binding key allowing the binding update to be sent securely to the correspondent node. This technique provides a validation to the mobile nodes' location and proves its ownership of the home agent. Return Routability provides a test to verify that the node is reachable. It does not verify that the IPv6 address is owned by the user. This method is combined with Cryptographically Generated Addresses to provide best of both worlds. The third aspect of the first security solution introduces a decentralised authentication mechanism. The correspondent requests the authentication data from both the mobile node and home agent. The mobile sends the data in plain text, which could be encrypted with the binding key and the home agent sends a hash of the data. The correspondent then converts the data so both are hashes and compares them. If they are the same, authentication is successful. This provides device and user authentication which when combined with Cryptographically Generated Addresses and Return Routability create a robust security solution called the Distributed Authentication Protocol. The second new technique was designed to provide an enhancement to a current security solution. Dual Identity Return Routability builds on the concept of Return Routability by providing two Mobile IPv6 addresses on a mobile device, giving the user two separate identities. After establishing address ownership with Cryptographically Generated Addresses, Dual Identity Return Routability would then send security data to both identities, each on a separate network and each having heir own home agents, and the mobile node would then combine them together to create the binding key allowing the binding update to be sent securely to the correspondent node. This technique provides protection against address spoofing as an attacker needs two separate ip addresses, which are linked together. Spoofing only a single address will not pass this security solution. One drawback of the security techniques described, however, is that none of them provide location privacy to hide the users IP address from attackers. An attacker cannot mount a direct attack if the user is invisible. The third new security solution designed is Mobile Home Agents. These are software agents, which provide location privacy to the mobile node by acting as a proxy between it and the network. The Mobile Home Agent resides on the point of attachment and migrates to a new point of attachment at the same time as the mobile node. This provides reduced latency communication and a secure environment for the mobile node. These solutions can be used separately or combined together to form a super security solution, which is demonstrated in this thesis and attempts to provide proof of address ownership, reachability, user and device authentication, location privacy and reduction in communication latency. All these security features are design to protect against one the most devastating attacks in Mobile IPv6, the false binding update, which can allow an attacker to impersonate and deny service to the mobile node by redirecting all data packets to itself. The solutions are all simulated with different scenarios and network configurations and with a variety of attacks, which attempt to send a false binding update to the correspondent node. The results were then collected and analysed to provide conclusive proof that the proposed solutions are effective and robust in protecting against the false binding updates creating a safe and secure network for all.
机译:无线通信技术已经出现,并且随着时代的飞跃而发展。随着通信的发展,系统架构,模型和范例也在发展。从2G到3G网络的安全性跃跃欲试。然而,这些问题仍然存在,并且如果不解决,将继续困扰移动通信向4G网络的飞跃。 4G将仅使用称为移动IP的体系结构基于Internet数据包的传输。这将具有许多优点,但是安全性仍然是要解决的基本问题。一个特定的安全问题涉及路由优化技术,该技术处理绑定更新。这允许相应的节点绕过本地代理路由器以直接与移动节点通信。绑定更新存在多种安全漏洞,其中包括拦截数据包,这将使攻击者可以窃听其内容,破坏用户的机密性,或者修改传输的数据包以用于攻击者自己的恶意目的。移动IP的其他可能漏洞包括地址欺骗,重定向和拒绝服务攻击。对于许多此类攻击,攻击者只需知道移动设备的家乡代理和相应节点的IPv6地址即可。有各种各样的安全解决方案可以防止这些攻击的发生。两种主要解决方案是加密和认证。密码术允许以不可解密的方式对传输的数据进行加密,从而使攻击者无法辨认任何被拦截的数据包。只有拥有相关密钥的一方才能解密该消息。身份验证是验证与之通信的用户或设备的身份的过程。存在不同的身份验证体系结构,但是其中许多体系结构都依赖中央服务器来验证用户,从而导致可能的单点攻击。分散式身份验证机制将更适合于移动IP的性质,并讨论了几种协议。但是,无论它们是否占用过多资源或提供重要的地址数据(可用于发起攻击),它们都具有缺陷。结果,对位置隐私进行了调查,以试图隐藏此敏感数据。最后,提出了一种安全解决方案,以解决绑定更新中发现的安全漏洞,并试图克服所检查的安全解决方案的弱点。本研究提出的安全协议涉及三种新的安全技术。第一个是使用已生成的加密生成地址和返回路由性的组合解决方案,然后引入新的身份验证过程来创建分布式身份验证协议,以帮助保护隐私,完整性和身份验证。第二个是对返回路由的增强功能,称为双重身份返回路由,该功能为同一设备上的多个身份提供位置验证身份验证。第三种安全技术称为Mobile Home Agents,它在提供位置隐私和优化的通信路由的同时,提供设备和用户身份验证。这三种安全技术可以一起使用,也可以单独使用,并且在接受绑定更新之前,必须先通过每种技术。加密生成的地址通过根据用户的公钥和辅助参数计算加密的单向哈希函数来生成接口标识符,从而声明用户对IPv6地址的所有权。可以通过重新计算哈希值并将哈希与接口标识符进行比较,来验证公钥和地址之间的绑定。此方法证明了地址的所有权,但是并没有证明地址可访问。建立地址所有权后,返回路由将向移动节点发送两个安全令牌,一个直接发送,一个通过归属代理发送。然后,移动节点将它们组合在一起以创建称为绑定密钥的加密密钥,从而允许将绑定更新安全地发送到对应节点。该技术提供对移动节点位置的验证,并证明其对归属代理的所有权。 Return Routability提供测试以验证节点是否可达。它不验证用户是否拥有IPv6地址。此方法与加密生成的地址结合使用,可提供两全其美的方法。第一安全解决方案的第三方面引入了分散式认证机制。对方从移动节点和家乡代理两者请求认证数据。手机以纯文本格式发送数据,可以使用绑定密钥对其进行加密,并且本地代理发送数据的哈希值。然后,通讯员将数据转换为散列并进行比较。如果它们相同,则认证成功。这提供了设备和用户身份验证,将它们与加密生成的地址和返回路由能力结合使用,可以创建一个强大的安全解决方案,称为分布式身份验证协议。第二种新技术旨在提供对当前安全解决方案的增强。通过在移动设备上提供两个移动IPv6地址,为用户提供两个单独的身份,双重身份返回可路由性基于可路由性的概念。在使用密码生成的地址建立地址所有权之后,双重身份返回路由将向两个身份发送安全数据,每个身份在单独的网络上并且每个都有继承人自己的家乡代理,然后移动节点将它们组合在一起以创建绑定密钥,从而允许绑定更新将安全地发送到对应节点。由于攻击者需要链接在一起的两个单独的IP地址,因此该技术可防止地址欺骗。仅欺骗单个地址不会通过此安全解决方案。然而,所描述的安全技术的一个缺点是它们都不提供位置隐私以向攻击者隐藏用户IP地址。如果用户不可见,则攻击者无法发起直接攻击。设计的第三个新安全解决方案是移动家庭代理。这些是软件代理,它们通过充当移动节点和网络之间的代理来为移动节点提供位置隐私。 Mobile Home Agent驻留在连接点上,并与移动节点同时迁移到新的连接点。这为移动节点提供了减少的延迟通信和安全的环境。这些解决方案可以单独使用,也可以组合在一起形成一个超级安全解决方案,本文将对此进行演示,并尝试提供地址所有权,可访问性,用户和设备身份验证,位置隐私和减少通信等待时间的证据。所有这些安全功能旨在防止移动IPv6中最破坏性的攻击之一,即虚假绑定更新,它可以使攻击者通过将所有数据包重定向到其自身来模拟和拒绝对移动节点的服务。所有解决方案都是在不同的场景和网络配置以及各种攻击下进行模拟的,这些攻击试图将错误的绑定更新发送到对应的节点。然后收集结果并进行分析,以提供确凿的证据,证明所提出的解决方案在防止虚假绑定更新方面是有效且强大的,从而为所有人创建了安全可靠的网络。

著录项

  • 作者

    Georgiades Andrew;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 English
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号