An Investigation of Cryptographically Generated Address (CGA) Based Authentication for Mobile IPv6

It is well known that the most promising approach to solving the problem of authentication in a mobile IPv6 network is to use CGA-based authentication. The only drawback is that CGA algorithms can be computationally expensive. This study analyses the performance of the CGA generation algorithm and proposes changes to impose a minimal computational security while maintaining reasonable performance. This study also compares the use of Rivest Shamir Ad leman (RSA) signatures with the Merkle Signature Scheme (MSS) for generating CGA Signatures. It finds that using MSS significantly improves the key generation time. However, more work needs to be done to improve both the CGA generation algorithm and MSS in order to make CGA-based authentication an attractive option in MIPv6 setups.

[1]  Claude Castelluccia Cryptographically Generated Addresses for Constrained Devices* , 2004, Wirel. Pers. Commun..

[2]  Christoph Krauß,et al.  Short Hash-Based Signatures for Wireless Sensor Networks , 2009, CANS.

[3]  Jari Arkko,et al.  Enhanced Route Optimization for Mobile IPv6 , 2007, RFC.

[4]  Mohammad Umar Siddiqi,et al.  An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6 , 2014 .

[5]  Luca Viganò,et al.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 2015, IWSEC 2015.

[6]  Maryline Laurent-Maknavicius,et al.  Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU , 2010, Comput. Secur..

[7]  Christoph Meinel,et al.  Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations , 2012, IEEE Security & Privacy.

[8]  Johannes Buchmann,et al.  Hash-based Digital Signature Schemes , 2009 .

[9]  Sinchai Kamolphiwong,et al.  Investigating Enhanced Route Optimization for Mobile IPv6 , 2008, 2008 13th Asia-Pacific Computer Systems Architecture Conference.

[10]  Jean-Pierre Hubaux,et al.  Analysis and Optimization of Cryptographically Generated Addresses , 2009, ISC.

[11]  Ali Buldu,et al.  IPV4/IPV6 security and threat comparisons , 2010 .

[12]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[13]  Zhong Chen,et al.  Survey of Authentication in Mobile IPv6 Network , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[14]  Christoph Meinel,et al.  CS-CGA: Compact and more Secure CGA , 2011, 2011 17th IEEE International Conference on Networks.