FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6

Christian Veigner, Chunming Rong

2005

Abstract

In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.

References

  1. Aura, T., 2002. Mobile IPv6 Security, Cambridge Security Protocols Workshop.
  2. Deng, R. H., Zhou, J., Bao, F., 2002. Defending Against Redirect Attacks in Mobile IP, Proceedings of the 9th ACM conference on Computer and communications security.
  3. Hinden, R., Deering, S., 2003. Internet Protocol Version 6 (IPv6) Addressing Architecture, IETF RFC 3513.
  4. Johnson, D., Percins, C., Arkko, J., 2004. Mobility Support in IPv6, IETF RFC 3775.
  5. Nikander, P., Arrko, J., Aura, T., Montenegro, G., Nordmark, E., 2005. Mobile IP version 6 Route Optimization Security Design Background, IETF Internet-draft.
  6. Thomson, S., Narten, T., 1998. IPv6 Stateless Address Autoconfiguration, IETF RFC 2462.
  7. Veigner, C., Rong, C., 2004. A new Route Optimization protocol for Mobile IPv6 (ROM), International Computer symposium 2004, Taipei.
Download


Paper Citation


in Harvard Style

Veigner C. and Rong C. (2005). FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6 . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-33-3, pages 36-43. DOI: 10.5220/0001414400360043


in Bibtex Style

@conference{icete05,
author={Christian Veigner and Chunming Rong},
title={FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2005},
pages={36-43},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001414400360043},
isbn={972-8865-33-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,
TI - FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6
SN - 972-8865-33-3
AU - Veigner C.
AU - Rong C.
PY - 2005
SP - 36
EP - 43
DO - 10.5220/0001414400360043