Dual identity return routability for the security of mobile Ipv6 binding updates within the distributed authentication protocol

The future fourth generation 4G networks will provide us with a paradigm shift in how mobile telecommunications will operate. It will be solely based on packet switching using mobile IPv6. However binding update route optimisation is vulnerable to a variety of security attacks. This paper attempts to reduce the security vulnerabilities by creating a new security protocol by first investigating the possible future technologies which may be incorporated into 4G mobile phones. Various technologies such as WI-FI and WiMax will be looked at but one in particular may be of particular interest, sim cards which allow the user to have multiple phone numbers. Using this technology and combining it with the established security protocol return routability, a new enhanced security solution is created called Dual Identity Return Routability. This solution provides an enhanced reachability test and a cheap authentication method, which can be incorporated into the distributed authentication protocol or be used as a stand-alone solution.

[1]  Michael Roe,et al.  Authentication of Mobile IPv6 Binding Updates and Acknowledgments , 2002 .

[2]  James Kempf Securing IPv6 Neighbor Discovery Using Address Based Keys (ABKs) , 2002 .

[3]  Michael Roe,et al.  Security of Internet location management , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[4]  Wassim Haddad Applying Cryptographically Generated Addresses to Optimize MIPv6 (CGA-OMIPv6) , 2005 .

[5]  BTexact Technologies,et al.  Future mobile networks : 3G and beyond , 2001 .

[6]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[7]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[8]  Jari Arkko,et al.  Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents , 2004, RFC.

[9]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[10]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[11]  ANDREW GEORGIADES,et al.  Trinity Protocol for Authentication of Binding Updates in Mobile IPv 6 , 2004 .

[12]  Pekka Nikander,et al.  Mobile IP version 6 (MIPv6) route optimization security design , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[13]  Pekka Nikander,et al.  Selection of MIPv6 Security Level Using a Hashed Address , 2002 .

[14]  Guido M. Schuster,et al.  Real-time voice over packet-switched networks , 1998, IEEE Netw..

[15]  Aboubaker Lasebae,et al.  Binding update security for mobile IPv6 using a distributed authentication protocol. , 2005 .

[16]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[17]  Patrick S. Ryan,et al.  WiMAX: Opportunity or Hype? , 2006 .

[18]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[19]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .