An Efficient MIPv6 Return Routability Scheme Based on Geometric Computing

IETF defines mobility support in IPv6, i.e. MIPv6, to allow nodes to remain reachable while moving around in the IPv6 internet. When a node moves and visits a foreign network, it is still reachable through the indirect packet forwarding from its home network. This triangular routing feature provides node mobility but increases the communication latency between nodes. This deficiency can be overcome by using a Binding Update (BU) scheme, which let nodes keep up-to-date IP addresses and communicate with each other through direct IP routing. To further protect the security of BU, a Return Routability (RR) procedure was developed. However, it has been found that RR procedure is vulnerable to many attacks. In this paper, we will propose a lightweight RR procedure based on geometric computing. In consideration of the inherent limitation of computing resources in mobile node, the proposed scheme is developed to minimize the cost of computations and to eliminate the overhead of state maintenance during binding updates. Compared with other CGA-based BU schemes, our scheme is more efficient and doesn-t need nonce tables in nodes.




References:
[1] D. Johnson, C. Perkins, J. Arkko, "Mobility Support in IPv6," Request for
comments 3775, IETF, June 2004
[2] Feng Yong, Wu Zhongfu, Zhong Jiang, Ye Chunxiao, Wu Kaigui, "A
Novel Authentication Mechanism Based on CGA for BU Message
Disposal in Mobile IPv6," International Conference on Networking,
Architecture, and Storage
[3] Fu-Chen Yang, Yen-Cheng Chen, "A stateless Return Routability
Scheme in Mobile IPv6," International Conference on E-Business and
Information System Security 2009, IEEE, Wuhan, China
[4] M. Roe, T. Aura, G.O-Shea, J. Arkko, "Authentication of Mobile IPv6
Binding Updates and Acknowledgements", IETF internet draft, February
2002
[5] Tuomas Aura, Michael Roe, "Designing the Mobile IPv6 Security
Protocol," Technical Report, April 2006.
[6] T. Aura, "Cryptographically generated addresses(CGA)," Request for
Comments 3972, IETF, 2005.
[7] Kui Ren, Wenjing Jou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H.
Deng, "Routing optimization security in mobile IPv6," Computer
Network, 2006, pp: 2401-2419
[8] Khaled Elgoarany, Mohamed Eltoweissy, "Security in Mobile IPv6: A
survey," Information Security Technical Report, ELSEVIER, March
2007.
[9] Ruidong Li, Jie Li, Kui Wu, Yang Xiao, Jiang Xie, "An Enhanced Fast
handover with Low Latency for Mobile IPv6," IEEE Transaction on
Wireless Communications, Vol. 7, No. 1, Jan 2008
[10] Warodom Werapun, Apinetr Unakul, "Secure Mobile IPv6 Binding
Updates with Identiy-based Signature," international conference on
Electronics Packaging, Jan 2004
[11] Jung-Doo Koo, Dong-Chun Lee, "Extended Ticket-based Binding
Update(ETBU) Protocol for Mobile IPv6(MIPv6) Networks," IEICE
TRANS. COMMUN., VOL.E90-B, NO. 4, APRIL 2007
[12] Tzong-Chen Wu, "Remote login authentication scheme based on a
geometric approach," Computer Communications, Vol 18, No. 12.
december 1995
[13] Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng, "A modified remote login
authentication scheme based on geometric approach" The journal of
Systems and Software 55, 2001 (287-290)