Access Path Based Source Address Validation in Mobile IPv6

被引:0
|
作者
Zhu, Min [1 ]
Xu, Ke [1 ]
Li, Qi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Tsinghua Natl Lab Informat Sci & Technol, Beijing, Peoples R China
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile IPv6 runs high risk of being attacked by IP spoofing due to the introduction of rnobility and route optimization. In this paper, an authentic IP address validation scheme is proposed to protect mobile nodes in Mobile IPv6 against IP spoofing attack. The mobile nodes' historical traffic information is leveraged to validate the authenticity of its claimed home address in the scheme. Compared with other authentication schemes, this scheme is much simpler to implement and easier to deploy based on the usage of real data, and does not require additional computational overhead. It also solves the address ownership problem and the unauthenticated binding update issue in Mobile IPv6. Real traces are used to demonstrate the applicability of the scheme in this paper. The experimental results show that only three consecutive historical packet records are required to construct a unique authentication key, which can identify forged home address efficiently.
引用
收藏
页码:334 / 349
页数:16
相关论文
共 50 条
  • [21] Address Knocking: an undetectable authentication based on IPv6 address
    Liu, Huisheng
    Wang, Zhenxing
    Liu, Yang
    2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 85 - 89
  • [22] A Handoff Algorithm Based on Care-of Address Pool for Hierarchical Mobile IPv6
    Cai, Kai
    Yang, Zhimin
    Chen, Rongyi
    Li, Chenghao
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 302 - +
  • [23] Identity-based Hierarchical Access Authentication in Mobile IPv6 Networks
    Tian, Ye
    Zhang, Yujun
    Zhang, Hanwen
    Li, Zhongcheng
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 1953 - 1958
  • [24] A Study on the Performance of IPv6-Based Mobility Protocols: Mobile IPv6 vs. Hierarchical Mobile IPv6
    Kong, Ki-Sik
    Roh, Sung-Ju
    Hwang, Chong-Sun
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2005, 1 (04) : 38 - 51
  • [25] Identity-based hierarchical access authentication in mobile IPv6 network
    Tian, Ye
    Zhang, Yu-Jun
    Zhang, Han-Wen
    Li, Zhong-Cheng
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (06): : 905 - 915
  • [26] On the issues of IP traceback for IPv6 and mobile IPv6
    Lee, HCJ
    Ma, M
    Thing, VLL
    Xu, Y
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 582 - 587
  • [27] Hierarchical access authentication method in mobile IPv6 networks
    Zhang, Hanwen
    Zhang, Yujun
    Tian, Ye
    Xiao, Wenshu
    Li, Zhongcheng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (01): : 51 - 57
  • [28] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Han, Youn-Hee
    Gundavelli, Sri
    Chung, Tai Myoung
    TELECOMMUNICATION SYSTEMS, 2009, 41 (04) : 279 - 292
  • [29] Analytical-numerical study of Mobile IPv6 and Hierarchical Mobile IPv6
    Yi, MK
    Hwang, CS
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 168 - 179
  • [30] Implementation of IPv6 address autoconfiguration
    Cao, Jiu-Xin
    Zhang, De-Yun
    Ding, Hui-Ning
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (04):