A NEW ROUTER CERTIFICATION AUTHORITY PROTOCOL FOR SECURING MOBILE INTERNET PROTOCOL VERSION 6 WAFAA ABDUL HADI ALI ALSALIHY UNIVERSITI SAINS MALAYSIA
|
|
|
- Millicent Cox
- 10 years ago
- Views:
Transcription
1 A NEW ROUTER CERTIFICATION AUTHORITY PROTOCOL FOR SECURING MOBILE INTERNET PROTOCOL VERSION 6 WAFAA ABDUL HADI ALI ALSALIHY UNIVERSITI SAINS MALAYSIA 2007
2 A NEW ROUTER CERTIFICATION AUTHORITY PROTOCOL FOR SECURING MOBILE INTERNET PROTOCOL VERSION 6 by WAFAA ABDUL HADI ALI ALSALIHY Thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy [November 2007]
3 ACKNOWLEDGEMENTS My deepest gratitude and appreciation goes to Allah (S.W.T). This thesis would never have been completed without His guidance. I also would like to take this opportunity to convey my sincere thanks to my supervisor: Assoc. Prof. Dr. Sureswaran Ramadass, the director of the National Advance IPv6 Centre for introducing me to the field of IPv6. And my deepest gratitude goes to my second supervisor Assoc. Prof. Dr. Azman Samsudin for the encouragement and invaluable guidance provided during the preparation of this thesis. Moreover, I would like to convey my appreciation to all National Advance IPv6 Centre members, Network Research Group members, School of Computer Sciences, Institute of Postgraduate Studies, and the university library for their help and support. Finally and most important, I would like to express my most sincere gratitude to my husband Dr. Issam for his encouragement. He has always encouraged me, believed in me, and supported me. I also would like to thank my parents Dr. Abdul Hadi and Dr. Faliha for all the support and encouragement they give me. ii
4 TABLE OF CONTENTS Page ACKNOWLEDGEMENTS TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATION LIST OF APPENDICES ABSTRAK ABSTRACT ii iii vi vii xi xii xiii xv CHAPTER ONE - INTRODUCTION 1.1 Background IP Mobility Overview of Mobile IPv6 Protocol Mobile IPv6 Example Binding Update in Mobile IPv The Current Problem The Proposed Solution Thesis Contribution Thesis Overview 17 CHAPTER TWO - LITERATURE REVIEW 2.1 Attacks That Exploit MobileIPv6 Signals Attacks when Binding Update Signals are not 19 Authenticated or Secured Attack Against Secrecy and Integrity Attack Using HoA to Send Unwanted Data to Any 22 Host Attack Using CoA to Send Unwanted Data to Any 23 Host Attacks when Binding Update Signals are 23 Authenticated and Secured Replay Attack in Mobile IPv Current Security Protocols in Mobile IPv6 25 iii
5 2.2.1 Internet Protocol Security (IPSec) Return Routability Protocol The Problem With the Current Security Protocols in Mobile 29 IPv Current Problem in Return Routability Protocol Current Problem in IPSec Current Research on Securing Mobile IPv6 Signals Address Based Key Stanford Research Cryptographically Generated Address Purpose Built key 39 CHAPTER THREE - THE DESIGN OF CA ROUTER'S CERTIFICATE (CARC) PROTOCOL 3.1 Assumptions about Cryptography Certification Authority Router Certificate (CARC) CARC Router Certificate Assumptions of CARC Router Certificate Router Certificate Creation Router Certificate Information Security Considerations of Router Certificate 48 Creation Router Certificate Renewal Security Considerations of Router Certificate 51 Renewal Router Certificate Revocation CARC Mobile Node s Sub-Certificate Mobile Node Sub-Certificate Information Mobile Node Sub-Certificate Generation Security Considerations of The Mobile Node 57 Sub-Certificate Generation Mobile Node Sub-Certificate Verification Security Considerations of the Mobile Node Sub- 63 Certificate Verification Mobile Node Sub-Certificate Renewal Security Considerations of Mobile Node Sub- 68 Certificate Renewal Revocation of Mobile Node Sub-Certificate Final Revised CARC CARC Operation within Mobile IPv6 and its Advantages 70 iv
6 CHAPTER FOUR - SIMULATION AND FORMAL VERIFICATION OF CARC USING MURPHY 4.1 Security Protocol Verifier Murphy The Methodology The Intruder Model Optimizing the Intruder Model Modeling the Protocol CARC Modeling Router Certificate Renewal Modeling Routers Modeling Certification Authority Modeling Intruders Security Verification Conditions Modeling Mobile Node Sub-Certificate Generation Modeling Mobile Nodes Modeling Routers Modeling Certification Authority Modeling Intruders Security Verification Conditions Modeling Mobile Nodes Sub-Certificate Verification Modeling Mobile Nodes Modeling Correspondent Nodes Modeling Intruders Security Verification Conditions Modeling Mobile Node Sub-Certificate Renewal Modeling Intruders Security Verification Conditions 110 CHAPTER FIVE - VERIFICATION RESULTS AND DISCUSSIONS 5.1 Discussion of the Verification Results Discussion of the Verification Results of Router Certificate Renewal Model Discussion of the Verification Results of Mobile Node Sub-Certificate Generation Discussion of the Verification Results of Mobile Node Sub-Certificate Verification Discussion of the Verification Results of Mobile Node Sub-Certificate Renewal 5.2 Comparison of CARC with the Current Protocol within Mobile IPv v
7 CHAPTER SIX - CONCLUSION AND FUTURE WORK 6.1 The New Security Protocol for Mobile IPv6 (CARC) Future Work 129 BIBLIOGRAPHY 131 APPENDICES Appendix A [ Samples of Verification Results ] 136 LIST OF PUBLICATIONS 181 LIST OF TABLES Section Page 5.2 Table 5.1: Comparison of CARC and RR 125 vi
8 LIST OF FIGURES Section Page 1.1 Figure 1.1: Flow of Designing Mobile IPv6 protocol 3 Figure 1.2: Mobile IPv6 Operations 8 Figure 1.3: IPv6 Address 9 Figure 1.4: Mobile node s Movement Detection 10 Figure 1.5: Binding Update with Home Agent 11 Figure 1.6: Triangle Routing 11 Figure 1.7: Route Optimization Figure 1.8: Security Protocols Used to Secure Binding Signals in Mobile IPv Figure 1.9: Our Protocol Used to Secure Mobile IPv6 Signals Figure 2.1: Attacks that Exploit BU in Mobile IPv6 20 Figure 2.2: Attack Against Secrecy and Integrity 21 Figure 2.3: Attack Using HoA to Send Unwanted Data to Any Host 22 Figure 2.4: Replay Attack 24 Figure 2.5: Return Routability Protocol Figure 2.6: Possible Locations for Attacks in Return Routability Protocol Figure 2.7: Addressed Based Key 34 Figure 2.8: Stanford Research 36 Figure 2.9: Cryptographically Generated Addresses 38 Figure 2.10: Purpose Built Key 39 Figure 2.11: The Evolution of the Mobile IPv6 Security Protocols Figure 3.1: The General Structure of CARC Figure 3.2: Router Information in this Stage 46 Figure 3.3: Router Certificate Renewal 49 vii
9 Figure 3.4: Part of Attack 1 52 Figure 3.5: Attack 2 52 Figure 3.6: Attack Figure 3.7: Node Sub-Certificate Generation 56 Figure 3.8: Attack 2 58 Figure 3.9: Attack 3 59 Figure 3.10: Attack 4 59 Figure 3.11: Attack 5 60 Figure 3.12: Node Sub-Certificate verification 62 Figure 3.13: Attack 1 64 Figure 3.14: Automatic Node Sub-Certificate Renewal 66 Figure 3.15: Node Sub-Certificate Renewal Initiated by Router Figure 4.1: Murphy Components Figure 4.2: Modeling Routers for Router Certificate Renewal Process 79 Figure 4.3: The First Rule of the Router Behavior 80 Figure 4.4: The Second Rule of the Router Behavior 81 Figure 4.5: The Third Rule of the Router Behavior 82 Figure 4.6: Modeling CA for Router Certificate Renewal Process 83 Figure 4.7: The First Rule of CA Behavior 84 Figure 4.8: The Second Rule of CA Behavior 86 Figure 4.9: Modeling Intruders 87 Figure 4.10: The First Rule of Intruder 87 Figure 4.11: The Second Rule of Intruder 88 Figure 4.12: The Third Rule of Intruder 89 Figure 4.13: The First Invariant 90 Figure 4.14: The Second Invariant 90 viii
10 Figure 4.15: Modeling Mobile nodes for Sub-Certificate Generation Process 92 Figure 4.16: The First Rule of Mn Behavior 93 Figure 4.17: The Second Rule of Mn Behavior 94 Figure 4.18: The Third Rule of Mn Behavior 95 Figure 4.19: Modeling Routers for Sub-Certificate Generation Process 96 Figure 4.20: The First Rule of the Router Behavior 97 Figure 4.21: The First Rule of CA Behavior 98 Figure 4.22: The Fourth Rule of Intruder 100 Figure 4.23: The First Invariant 100 Figure 4.24: Modeling Mobile Nodes for Sub-Certificate Verification Process 101 Figure 4.25: The First rule of Mn Behavior 103 Figure 4.26: The Second rule of Mn Behavior 104 Figure 4.27: Modeling Correspondent Nodes for Sub- Certificate Verification Process 105 Figure 4.28: The First Rule of Cn Behavior 106 Figure 4.29: The First Rule of Invariant 107 Figure 4.30: The First Rule of Mn Behavior 108 Figure 4.31: The First Rule of Router Behavior Figure 5.1: Verification of Router Certificate Renewal by Murphy3.1 DFSearch Figure 5.2: Verification of Router Certificate Renewal by Murphy3.1 BFSearch Figure 5.3: Verification of Router Certificate Renewal by 3Murphy DFSearch Figure 5.4: Verification of Router Certificate Renewal by 3Murphy BFSearch Figure 5.5: Verification of Mobile Node Sub-Cert. Generation by Murphy3.1 DFSearch ix
11 Figure 5.6: Verification of Mobile Node Sub-Cert. Generation by Murphy3.1 BFSearch Figure 5.7: Verification of Mobile Node Sub-Cert. Generation by 3Murphy DFSearch Figure 5.8: Verification of Mobile Node Sub-Cert. Generation by 3Murphy BFSearch Figure 5.9: Modification of Mobile node Behavior for Subcertificate Generation Figure 5.10: Modification of CA Behavior for Sub-certificate Generation Figure 5.11: Verification of Revised Mobile Node Sub-Cert. Generation by Murphy3.1 DFSearch Figure 5.12: Verification of Revised Mobile Node Sub-Cert. Generation by Murphy3.1 BFSearch Figure 5.13: Verification of Revised Mobile Node Sub-Cert. Generation by 3Murphy DFSearch Figure 5.14: Verification of Revised Mobile Node Sub-Cert. Generation by 3Murphy BFSearch Figure 5.15: Verification of Mobile Node Sub-Cert. Verification by Murphy3.1 BFSearch Figure 5.16: Verification of Mobile Node Sub-Cert. Verification by Murphy3.1 DFSearch Figure 5.17: Verification of Mobile Node Sub-Cert. Verification by 3Murphy DFSearch Figure 5.18: Verification of Mobile Node Sub-Cert. Verification by 3Murphy BFSearch x
12 LIST OF ABBREVIATION Section Page 1.1 IPv6 Internet Protocol version 6 1 IPv4 Internet Protocol version 4 1 IP Internet Protocol 1 IETF Internet Engineering Task Force 1 NAT Network Address Translation 3 CIDR Classless Inter Domain Routing 3 TCP Transport Control Protocol 4 UDP User Datagram Protocol 4 ARP Address Resolution Protocol 5 IPSec Internet Protocol Security 7 RR Return Routability 7 HA Home Agent 9 Mn Mobile node 9 Cn Correspondent node 9 BU Binding Update 9 BA Binding Acknowledgment 9 HoA Home of Address 9 CoA Care of Address 9 MAC Multiple Access Control 9 EUI-64 Extended Unique Identifier SPD Security Policy Database 15 SAD Security Association Database 15 SA Security Association 15 AH Authentication Header 15 ESP Encapsulation Security Payload CA Certification Authority CARC Certification Authority Router Certificate t time 19 RO Route Optimization IKE Internet Key Exchange 26 ISAKMP Internet Security Association and Key Management Protocol 26 K bm Binding Management Key 27 HoTI Home Test Init 27 xi
13 CoTI Care-of Test Init 27 HoT Home Test 27 CoT Care-of Test LAN Local Area Network IPKGR Identity-Based Private Key Generator 33 TTP Trusted Third Party e-commerce Electronic-Commerce 43 ISP Internet Service Provider ARQ Automatic Repeat Request 51 LIST OF APPENDICES Page Appendix A [ Samples of Verification Results ] 136 xii
14 SATU PROTOKOL AUTORITI PERAKUAN PENGHALA BARU UNTUK MENJAMIN PROTOKOL INTERNET BERGERAK VERSI 6 ABSTRAK Protokol Internet Bergerak versi 6 (IPv6 Bergerak) telah dicadangkan sebagai satu protokol piawai untuk memberikan mobility dalam Rangkaian Generasi Seterusnya. Sebagai satu protokol baru, Protokol IPv6 Bergerak mempunyai beberapa isu yang perlu ditangani seperti memperluaskan protokol untuk memberikan mekanisma hand off yang lancar dan pantas, mobility rangkaian, kualiti perkhidmatan dan pengurusan lebarjalur bagi aplikasi mobility masa sebenar. Namun, isu yang paling utama ialah kerentanan sekuriti IPv6 Bergerak kerana tanpa sekuriti yang sempurna, protokol tersebut tidak akan berguna. IPv6 Bergerak mempunyai tiga komponen utama: nod Bergerak, nod Koresponden dan Agen Rumah. Untuk menjamin keselamatan protokol, nod Bergerak dan Agen Rumah perlu mempercayai satu sama lain. Nod Koresponden perlu mempercayai nod Bergerak kerana nod Bergerak merupakan nod yang memberikan dan mengemaskinikan maklumat ke nod Koresponden. Isyarat-isyarat di antara ketiga-tiga komponen ini seharusnya dijamin selamat dan disahkan benar. Pada masa ini, IPv6 Bergerak ditakrifkan menggunakan penyelesaian sekuriti yang dinamakan Kebolehjalanan Kembali (Return Routability) yang membekalkan nod Bergerak dengan mekanisma pengesahan dan melindungi isyarat-isyarat yang dihantar di antara nod Bergerak dan nod Koresponden. IPv6 Bergerak memberikan mandat pada sokongan Sekuriti Protokol Internet (IPSec) di antara nod Bergerak dan Agen Rumahnya untuk membolehkan keduanya mempercayai satu sama lain dan untuk melindungi isyarat yang dihantar di antara keduanya. Walaupun IPSec mampu menawarkan perlindungan yang baik (bergantung kepada algoritma yang digunakan), xiii
15 penggunaan IPSec dalam Kebolehjalanan Kembali tidak semestinya merangkumi semua bidang sekuriti. Penyelesaian ini tidak dapat mengatasi serangan Orang Tengah. Objektif utama tesis ini ialah untuk mereka bentuk satu protokol sekuriti baru untuk memberikan tahap pengesahan dan sekuriti yang lebih ketat bagi IPv6. Protokol sekuriti ini perlu memberikan satu tahap sekuriti dan pengesahan yang lebih ketat berbanding dengan mekanisme yang ada sekarang iaitu Kebolehjalanan Kembali. Selain daripada itu, protokol sekuriti yang dicadangkan ini akan memberikan satu rangka kerja konsisten yang menggantikan pelaksanaan IPSec menyeluruh dalam IPv6 Bergerak. Protokol sekuriti yang dicadangkan ini dinamai Sijil Penghala Autoriti Perakuan (CARC) akan juga memastikan perlindungan daripada serangan Orang Tengah. Protokol yang baru dicadangkan ini telah disahkan dengan jayanya dengan menggunakan dua versi pengesah Murphy, Murphy 3.1 dan Murphy Ganda Tiga. Dalam kedua-dua pengesahan, protokol yang baru telah dibuktikan lebih selamat daripada protokol Kebolehjalanan Kembali. xiv
16 A NEW ROUTER CERTIFICATION AUTHORITY PROTOCOL FOR SECURING MOBILE INTERNET PROTOCOL VERSION 6 ABSTRACT Mobile Internet Protocol version 6 (Mobile IPv6) has been proposed as a standard protocol to provide mobility in Next Generation Networks. Mobile IPv6 protocol as a new protocol has a few issues that need to be addressed such as extending the protocol to provide smooth and fast hand off mechanisms, network mobility, quality of service and the bandwidth management of real time mobility applications. However, the biggest issue is the security vulnerability of Mobile IPv6 because without proper security the protocol will be useless. Mobile IPv6 has three main components: the Mobile node, the Correspondent node and the Home Agent. For the protocol to be secure, the Mobile node and its Home Agent should trust each other. The Correspondent node should trust the Mobile node because the Mobile node is the one giving and updating the information to the Correspondent node. The signals between all of these components should be secured and authenticated. Mobile IPv6 is currently defined with a security solution called Return Routability that provides the Mobile node with an authentication mechanism and protects the signals between the Mobile node and the Correspondent node. Mobile IPv6 mandates the Internet Protocol Security (IPSec) support between the Mobile node and its Home Agent to let them trust each other and to protect the signals between them. While IPSec may offer strong protection (depending on the algorithm used), the use of IPSec within Return Routability does not necessarily cover all areas of security. This solution is especially vulnerable to the Man-in the-middle attack. xv
17 The main objective of this thesis is to design a new security protocol to provide higher levels of authentication and security for Mobile IPv6. This security protocol has to provide a level of security and authentication which is higher than the current mechanism which is Return Routability. Additionally, the new proposed security protocol will provide a consistent framework replacing the comprehensive IPSec implementation within Mobile IPv6. This proposed new security protocol called Certification Authority Router s Certificate (CARC) will also ensure protection against the Man-in the-middle attack. The new proposed protocol was successfully verified using two versions of the Murphy verifier, Murphy 3.1 and Triple Murphy. In both verifications, the new protocol proved to be more secure than the Return Routability protocol. xvi
18 CHAPTER ONE INTRODUCTION This chapter is divided into five sections, the first section introduces Internet Protocol Version 6 (IPv6), it then goes to give a brief description of the concept of mobility, followed by the reasons as to why Mobile IPv6 is preferred over Mobile IPv4. After that, how Mobile IPv6 works are described. The importance of Binding Update signals has been outlined. An overview of the current problem in the Mobile IPv6 security protocol is also described. Then the last sections give the proposed idea as well as the thesis contribution. 1.1 Background The rapid increase in the number of Internet users, combined with the expected growth in the number of Mobile Internet Protocol (Mobile IP) users requires a scalable and flexible IP technology, which is not provided by IPv4 efficiently. IPv6 is the next generation protocol (Silvia, 2000, Davies, 2003, RFC2460, 1998 and IPv6 Ready, 2003) designed by the Internet Engineering Task Force (IETF) to replace the current version of the Internet Protocol, IPv4 (RFC791, 1981). IPv6 offers a big package of capabilities, of which addressing is the most visible component. Even though the addressing issue gets a lot of attention (RFC2373, 1998), it is only one of many important issues that IPv6 designers have tackled. Other IPv6 capabilities include mobility, integrated quality of services, automatic configuration, and more efficient network route aggregation at the global backbone level. Mobility support in IPv6 (RFC3775, 2004, Hesham, 2004 and HZNET, 2005) is particularly important, as mobile devices are likely to account for a majority or at least a substantial fraction of the population of the Internet during IPv6 s lifetime. Mobile IPv6 1
19 is an extension of IPv6 that need to use one of the extension headers called Mobility Header and need to exchange Mobile IPv6 signals called Binding Update signals Next section explains the idea of IP mobility and then lists the reasons as to why mobility support in IPv6 (RFC3775, 2004) is preferred compared to mobility support in IPv4 (RFC3344, 2002) IP Mobility The meaning of mobility does not necessarily indicate mobility for wireless devices as it can also mean wired devices that can be disconnected from a specific point and reconnected to other points. Mobile computing offers many advantages such as access to the Internet anytime, anywhere. Mobile IP refers to the mobility aspect of IP that allows nodes to move to different networks all over the world while maintaining upper layer connectivity (Webopedia Computer, 2007). This is not to be confused with portability that allows nodes to move to different networks all over the world and remain reachable, while causing upper-layer connections to be disrupted each time a node relocates as it has to obtain a new IP address at each location. Mobile IP is intended to enable nodes to move from one IP network to another without changing the mobile node's IP address. The idea behind this is to allow a Mobile node to be always addressable by its "home address". Packets that are routed to the Mobile node will use the Mobile node s home address regardless of the Mobile node s current point of attachment to the Internet. The Mobile node may continue to communicate with other nodes (stationary or mobile), after moving to a new network. The movement of a Mobile node away from its home network is thus transparent to upper-layer protocols and applications. 2
20 IP Mobility in IPv4 applies the concept of Mobile IP, using the capabilities offered by the IPv4 protocol. IPv4 is proven to be robust, easily implemented and interoperable, and has stood the test of scaling, to be the size of today s Internet, using different mechanisms such as Network Address Translation (NAT) (WIKIPEDIA, 2007a) and Classless Inter Domain Routing (CIDR) (WIKIPEDIA, 2007b). However, the design of IPv4 did not take into consideration certain issues, including mobility. IPv6 on the other hand, provides many capabilities compared to IPv4 such as having more addresses, header extension, mobility support, built-in quality of service, address auto-configuration, and host discovery. Thus Mobile IPv6 applies the concept of Mobile IP using the capabilities offered by the IPv6 protocol and tackles the limitations that exist in Mobile IPv4. Figure 1.1 demonstrates the flow of designing the Mobile IPv6 protocol. Mobile IP IPv4 Draft of Mobile IPv4 Mobile IPv6 as a proposed standard IPv6 Limitations of the Mobile IPv4 draft Figure 1.1: Flow of Designing Mobile IPv6 protocol 3
21 Mobile IPv6 protocol has become the standard for mobility, now and for future Internet applications rather than Mobile IPv4. The seven main reasons for this are listed below: 1- Mobile IPv6 support for Route Optimization: Route optimization is not found in Mobile IPv4 because of the inflexibility of the IPv4 header (GIAC, 2003). The Home Address Option header and Routing header which facilitate the route optimization are missing in IPv4. This integration of route optimization functionality allows direct routing from any Correspondent node to any Mobile node, without needing to pass through the Mobile node s home network. This eliminates the problem of triangle routing present in Mobile IPv4. The integration of route optimization reduces the amount of re-routing and tunnelling work for the Home Agent. This results in less traffic passing through the home link, thus reducing bottlenecks at the home link, and thereby saving 50 percent of Internet performance and bandwidth compared to using triangle routing (Nokia Research Center, 2002a). 2- Home Address Option header: Home Address Option header, which is one of the Extension Headers in IPv6 allows Mobile nodes to co-exist efficiently with routers that perform ingress filtering (Nokia Research Center, 2002b). A Mobile node now uses its care-of address as the source address in the header of packets it sends, allowing the packets to pass normally through ingress filtering routers whereas the home address of the Mobile node is carried in the Home Address Option header. Another advantage of using a Home Address Option header is allowing the use of a care-of address in the packet to be transparent to the upper-layers such as Transport Control Protocol (TCP) and User Datagram Protocol (UDP). The ability to process correctly a Home Address option in a received packet is required in all IPv6 nodes, whether mobile or stationary, host or router. 4
22 3- Home-of Address as the Multicast source address: This can be used within each packet's IP header to simplify routing of multicast packets sent by a Mobile node (Youn-Hee and Seung-Hee, 2006). With Mobile IPv4, the Mobile node has to tunnel the multicast packets to its Home Agent in order to transparently use its home address as the source of the multicast packets. With Mobile IPv6, the Home Address Option header allows the home address to be used and still be compatible with the multicast routing that is based in part on the packet's source address. 4- Foreign agents not needed: There is no longer any need to deploy special routers as "foreign agents" as is proposed in Mobile IPv4. In Mobile IPv6, the Mobile nodes make use of the enhanced features of IPv6, such as Neighbor Discovery (RFC2461, 1998) and Address Autoconfiguration (RFC2462, 1998), to operate in any location away from home without any special support required from its local router. 5- Movement detection mechanism in Mobile IPv6: This provides bidirectional confirmation of a Mobile node's ability to communicate with its default router in its current location. This confirmation provides a detection of a "black hole" situation that may exist in some wireless environments. The link in such environments to the router does not work equally well in both directions, such as when a Mobile node has moved out of a good wireless transmission range from the router. In contrast, in Mobile IPv4, only the forward direction (packets from the router to the Mobile node) is confirmed, allowing the black hole condition to persist. 6- IPv6 Neighbor Discovery: Home Agent intercepts the packets for the Mobile node that arrive at the home network, using IPv6 Neighbor Discovery rather than Address Resolution Protocol (ARP) mechanism. The use of Neighbour Discovery improves the robustness of the protocol (Eddy and Ishaq, 2006) and simplifies the implementation of Mobile IP because it is not concerned with any particular data link 5
23 layer as is required in ARP. 7- IPv6 Anycast: The dynamic Home Agent address discovery mechanism in Mobile IPv6 uses IPv6 Anycast which returns a single reply to the Mobile node (Ata et al., 2005), rather than the corresponding Mobile IPv4 mechanism, which uses IPv4 directed broadcast and returns a separate reply from each Home Agent on the Mobile node's home link. The Mobile IPv6 mechanism is more efficient and more reliable, since only one packet needs to be sent back to the Mobile node. The above reasons clearly indicate the advantages of Mobile IPv6 over Mobile IPv4. Next section provides an overview of Mobile IPv6 protocol Overview of Mobile IPv6 Protocol The two main objectives of the Mobile IPv6 protocol are enabling IPv6 nodes to move from one IP network to another IP network without any interruption in connection, and optimizing the route between the nodes, thereby making the Mobile node and its Correspondent node communicate directly with each other (RFC3775, 2004). Mobile IPv6 protocol has three base operations, which are Movement Detection, Triangle Routing, and Route Optimization: Operation one: Movement Detection has two mechanisms: Router discovery and Construction of the new Mobile node s IPv6 address Care of Address. Operation two: Triangle Routing has another two mechanisms whereby the first one is the Binding Update with Home Agent, which is the responsibility of the Mobile node to send Binding Update signals to the Home Agent to inform it about a new IPv6 address. The second mechanism is proxy and tunnelling which is the 6
24 responsibility of the Home Agent to intercept the packets addressed to the Mobile node s original address and tunnel it to the Mobile node s new address. Operation three: Route Optimization is the operation that eliminates the use of triangle routing and makes for direct communication with any other node. Route Optimization is achieved via two steps: the first step is when the Mobile node sends Binding Update signals to inform its Correspondent node about its new IPv6 address. The second step is the direct communication whereas the Correspondent node sends packets directly to the Mobile node. The protocols used to secure the Binding Update with the Home Agent and the Binding Update with the Correspondent node respectively are considered security extended protocols. The security protocol used to secure the Binding Update with the Home Agent is called Internet Protocol Security (IPSec) whereas the security protocol used to secure the Binding Update with its Correspondent node is called Return Routability (RR). Mobile IPv6 operations and protocols are shown in Figure
25 Mobile IPv6 Operations Base Operations Security Extended protocols IPSec To secure Binding Update between Mobile node and Home Agent RR To secure Binding Update between Mobile node and Correspondent node 1 Movement Detection 2 Triangle Routing 3 Route Optimization Router Discovery Construct Care of Address Binding Update with Home Agent Proxy + Tunnelling To Mobile node Binding Update to correspondent node Direct Communication Figure 1.2: Mobile IPv6 Operations The example given below which is about the behaviour of a laptop as a Mobile node explains one example of mobility in IPv6 in a clearer manner Mobile IPv6 Example Figures 1.4, 1.5, 1.6 and 1.7, respectively will be used for this example. In the figures the author will use the Mobile IPv6 terminology, which is explained in the next page. 8
26 HA: The router that functions as Home Agent in home network. Mn: A laptop as a Mobile node Cn: Stationary or mobile PC as Correspondent node BU: Binding Update signal BA: Binding Acknowledgment signal HoA: Mobile node s Home of Address CoA: Mobile node s Care of Address MAC: The physical address associated with the network card If more than one device at home or in the office have an IPv6 address, then the use of a router at that place is needed. The Home Agent is a router that advertises its prefix to the nodes within its home network. Then the Mobile node can construct its IPv6 address which is called Home of Address from the prefix of the router combined with the interface identifier of the device. Interface identifier is the MAC address mapped to the Extended Unique Identifier (EUI-64) address as shown in Figure 1.3. Router prefix Interface identifier Figure 1.3: IPv6 Address The home network is the network where the Mobile node (laptop in this example) has been booted and configured for the first time with the attached Home Agent. Any node or device that leaves the home network for a while to another network is considered a Mobile node. The network that the node visits, or moves to is called foreign network. In this example, the home network is setup at home and the foreign network is considered at office, as shown in Figure 1.4 9
27 Any other node that communicates with the Mobile node is considered its Correspondent node. The Correspondent node can be in the same visited network or from the other network as shown in Figure 1.4. Figure 1.4, shows the movement of a Mobile node from a home network to an office network. In the office network, the Mobile node, which is the laptop, has to discover the local router by using the Neighbour Discovery mechanism. The laptop then constructs its new IPv6 address from the router prefix and laptop s MAC address using the Stateless Autoconfiguration mechanism. The newly constructed address is called Care of Address. Office Network Mobile Node Mn (CoA) DHCPv Mn (HoA) HA Route Home Agent Internet Local router Route Home Network Route Correspondent node Cn Other Network Figure 1.4: Mobile node s Movement Detection After the Mobile node has constructed a new IPv6 address, the Mobile node should inform its Home Agent about this new address using the Binding Update signal as shown in Figure 1.5, Message 1. The Home Agent replies with a Binding Acknowledgment as shown in Message 2. 10
28 Office Network BU 2 Mobile Node Mn DHCPv HA 1 Route BA Internet Home Network Route Correspondent node Cn Other Network Figure 1.5: Binding Update with Home Agent The Correspondent node from the other network (Figure 1.6), which sends packets to the Mobile node s original address as shown in Message 1, does not know about the new address of the Mobile node. The Home Agent will intercept the packets by using a proxy mechanism and then tunnel the packets to the Mobile node s new address in Message 2. Office Network Tunnelled Packet 2 Mobile Node DHCPv HA Route 1 Home Agent Internet Packet Home Network Route Figure 1.6: Triangle Routing Correspondent node Cn Other Network 11
29 Upon receiving the tunnelled packets, the Mobile node will send Binding Update signals to inform the Correspondent node about the Mobile node s new address as shown in Figure 1.7. The Correspondent node will reply with a Binding Acknowledgment to Mobile node. After exchanging the binding signals, the direct communication between the Mobile node and its Correspondent node can be achieved. Office Network Mn Mobile Node BA DHCPv HA H Internet BU Home Network Correspondent node Cn Other Network Figure 1.7: Route Optimization In Mobile IPv6, binding signals are considered to be one of the cornerstones of the protocol. Only binding signals can keep the Mobile node reachable at any location with any IPv6 address, which is the main goal of Mobile IPv6. The next section defines binding signals in Mobile IPv Binding Update in Mobile IPv6 The association between a Mobile node's Home of Address and the Mobile node s Care of Address for a specific life time is known as Binding. If the Mobile node informs the other nodes about this association, then the Mobile node is doing Binding 12
30 Updates. Other nodes that receive this Binding Update signal will confirm receiving it with a Binding Acknowledgment as shown in the example above. The Binding Update has to be sent from the Mobile node to the Home Agent and this process is called Binding Update with the Home Agent or Home Agent Registration. Binding Update signals also have to be sent from the Mobile node to the Correspondent node and this is called Binding Update with Correspondent node. 1.2 The Current Problem The Mobile IPv6 still has some issues that not solved yet. However, the biggest issue is the security vulnerability within Mobile IPv6, because without proper security, the protocol will be useless. There are two solutions for securing Mobile IPv6 s Binding Updates. The first solution concerns securing the Binding Update signals between the Mobile node and its Home Agent by the use of IPSec (RFC3776, 2004). The second solution, concerns the securing of the Binding Update signals between the Mobile node and its Correspondent node, which is more complex due to the absence of a pre-relationship between the Mobile node and its Correspondent node. The Mobile IP group has designed and documented (RFC3775, 2004) the protocol Return Routability. The next section gives a brief explanation about the two mechanisms, Return Routability and IPSec. Figure 1.8 shows the current security protocols used to secure the Mobile IPv6 protocol. 13
31 Mn IPSec RR HA Cn Figure 1.8: Security Protocols Used to Secure Binding Signals in Mobile IPv6 Return Routability (RR) The Return Routability protocol enables the Correspondent node to obtain assurance that the Mobile node is in fact addressable at its claimed Care of Address as well as at its home address. In other words, this lets the Mobile node prove that it is addressable by both addresses which are the original one (Home of Address) and the new one (Care of Address). Only with this assurance is the Correspondent node able to accept Binding Updates from the Mobile node, which causes the Correspondent node to direct that Mobile node's data traffic to its claimed Care of Address. During Return Routability the two nodes, mobile and correspondent, should exchange keys that have to be used for encryption purposes and also for the authentication. The problem in Return Routability (Wafaa and Sureswaran, 2003) is that there are some locations near the Correspondent node, which allow the attacker to sniff the keys and convince the Correspondent node to believe that the attacker is the original Mobile node. There is some research on improving the performance of Return Routability when there is more than one Mobile node communicating with the same Correspondent node (Feng et al., 2005) but such improvement still face this type of attack because the messages still have to be sent in plain text. 14
32 Internet Protocol Security (IPSec) IPSec (Cisco, 2006) is a general purpose protocol used to secure packets in the IP layer. IPSec contains a lot of options and policies, which are stored in the Security Policy Database (SPD). Options such as the keys, the algorithms of encryption and authentication and the parameters associated with each algorithm need to be decided before each session of communication for each IP s data traffic occurs. IPSec also has a Security Association Database (SAD), where the negotiated algorithms with the key between the two nodes with their identities are stored. IPSec Security Association (SA) is unidirectional. When establishing secure communications for bidirectional communication between two nodes, one needs to configure security associations for each direction. IPSec has two mechanisms, Authentication Header (AH) (RFC2402, 1998), which is used for authentication and an Encapsulation Security Payload (ESP) (RFC2406, 1980), which is used for encryption. In Mobile IPv6, IPSec is used to secure the Binding Update signals between the Home Agent and the Mobile node (RFC3776, 2004). Both AH and ESP are needed to achieve the authentication and the integrity of the Binding Update signals. Each mechanism has its own tunnelling and algorithm. Manual configuration is needed to set the keys and algorithms for the Security Association Database with the Home of Address as the identity for the Mobile node. IPSec is considered a battery taxing protocol for mobile devices. 15
33 1.3 The Proposed Solution A Certification Authority (CA) is a trusted third party organization or company that issues digital certificates to users. A digital certificate is an electronic document binding together some pieces of information, such as a user s identity and public key. Digital certificates are used with applications such as s or online Banking due to the non-repudiation (high authentication) that is provided to the other party. The other party should only verify the certificate by checking the signer. Two major types of certificates exist: end-entity certificate and CA certificate. An end entity certificate is issued by a Certification Authority to an entity that does not in turn issue certificates to another entity. A CA certificate is issued by a Certification Authority to an entity that is also a Certification Authority and so may issue an endentity certificate. Certificates can be issued to users as well as routers and nodes. Certificates based on users identity is described in many publications, however, certificates for routers and nodes still remain a new field of research. The focus of this thesis is on a CA certificate which allows the design of a Router Certification Authority protocol. In this case, the Certification Authority issues a certificate for routers who in turn issues sub-certificates to the end nodes. This protocol (Wafaa and Azman, 2006) allows the generation, renewal, and revocation of the router certificate as well as the generation, renewal, and revocation of the node subcertificate. Such a protocol is novel and has never been designed before. This new protocol eliminates the need for Return Routability within the Mobile IPv6 environment (see Figure 1.9). This is done while still ensuring an even higher level of security than that provided by Return Routability (with or without IPSec). 16
34 This new protocol can prevent attacks faced by Mobile IPv6 like the Man-In- The-Middle attack. Other security attacks like Replay Attack, Simple Denial of Service and Spoofing of IPv6 addresses can also be avoided in Mobile IPv6 using the new protocol. Chapter 3 explains this in more detail. The proposed new protocol replaces IPSec Mn The proposed new protocol replaces RR HA Cn Figure 1.9: Our Protocol Used to Secure Mobile IPv6 Signals 1.4 Thesis Contribution The contributions of the thesis are: An CA router certificate protocol which allows the generation, renewal, and revocation of the router certificate as well as the generation, renewal, and revocation of the node sub-certificate Constructing a new format of Router Certificate which is the extension of the Certificates X.509v3. Using the CA router certificate protocol to create a more secure environment within Mobile IPv6 1.5 Thesis Overview This thesis is organized into six related chapters. Chapter 1 presents the background of this thesis. It starts by presenting an introduction of IPv6, it then goes to give a brief description of the concept of mobility, followed by the reasons as to why 17
35 Base Operations Mobile IPv6 is preferred over Mobile IPv4. After that, how Mobile IPv6 works are described. The importance of Binding Update signals, which are needed to achieve the mobility in IPv6, have been outlined. An overview of the current problem in the mobile IPv6 security protocol is also described. Then the last section introduces the proposed idea as well as the thesis contribution. Chapter 2 gives an overview of the problem in the current protocol and then discusses the alternative solutions proposed by other researchers. Chapter 3 is the core of the thesis which presents the design of the new protocol named CARC. This chapter gives a detailed description of the new protocol. This includes the design details for the generation of the router s certificate and the node sub-certificate as well as the renewal and revocation processes. The chapter also describes the possibility of the attacks in each process and how they can be avoided. Implementation of the first version of CARC was done. However, simulation results led to the second and final (improved) version of CARC that is presented in the second last section. Last section discuss the operation of CARC within Mobile IPv6 and its advantages Chapter 4 discusses the security protocol verifier (Murphy) as well as the description of CARC simulation and formal verification is given in this chapter. Some of the verification scenarios are given in full detail. Chapter 5 is the summary of the verification results and its discussions. Chapter 6 is the conclusion and an outline of possible future work to continue and enhance the proposed research within this thesis. 18
36 CHAPTER TWO LITERATURE REVIEW This chapter analyses all the attacks that exploit the Mobile IPv6 signals, explains in detail the current security protocols used in Mobile IPv6 and their problems and then describes alternative solutions proposed to replace the current security protocols within Mobile IPv Attacks That Exploit Mobile IPv6 Signals Mobile IPv6 signals are usually referred to as Binding Update signals in Mobile IPv6 literature. This thesis will use both names alternatively. The Binding Update signal is an association of the Mobile node s Home of Address (HoA) and Care of Address (CoA) for a specific lifetime (t). The Mobile node has to send these signals to the Home Agent and then to the correspondent node after each movement. These signals are vulnerable to many attacks. Attacks that exploit the Binding Update signals in Mobile IPv6 can be classified into two types as listed below and explained in our work (Wafaa and Sureswaran, 2003). Figure 2.1 shows all the attacks: 1- Attacks when Binding Update signals are not authenticated or secured 2- Attacks when Binding Update signals are authenticated and secured Attacks when Binding Update Signals are not Authenticated or Secured If Binding Update signals are not authenticated and secured, then the attacker can send spoofed Binding Update, which can result in one of the following attacks: 19
37 1- Attack against secrecy and integrity 2- Attack using HoA to send unwanted data to any host 3- Attack using CoA to send unwanted data to any host The explanation for the attacks is in the next sections. Attacks that Exploit BU in Mobile IPv6 Attacks when BU are not authenticated or secured. Section Attacks when BU are authenticated or secured. Section Attack explained in attacks that exploit each solution in Section 2.4 Attacks faced by RR in Section Attack against secrecy and integrity. Section Attack using HoA to send unwanted data to any host. Section Attack using CoA to send unwanted data to any host. Section Figure 2.1: Attacks that Exploit BU in Mobile IPv6 20
38 Attack Against Secrecy and Integrity An attacker sends a spoofed Binding Update to the Correspondent node as shown in Figure 2.2. An attacker can capture the data intended for the Mobile node and by pretending to be the Mobile node can hijack the connection with the Correspondent node, or establish new spoofed connections. Consequently, the attacker is able to see and modify the packets sent between the Correspondent node and the Mobile node. These attacks are possible when the Mobile node and the Correspondent node support Route Optimization (RO) and the attacker knows their IP addresses. Strong encryption and integrity protection can prevent all sorts of attacks against data secrecy and integrity. :Mn : Attacker :Cn BU Spoofed BU Spoofed BA BA Figure 2.2: Attack Against Secrecy and Integrity [1] Mn Cn (captured by attacker): BU [2] Attacker Cn: spoofed BU [3] Cn Mn (Captured by attacker): BA [4] Attacker Mn: spoofed BA 21
39 Attack Using HoA to Send Unwanted Data to Any Host When the Binding Update signal is not authenticated, the attacker can choose any arbitrary address as its Home of Address (HoA) and thus target any Internet node. What happens is that an attacker claims to be a Mobile node with the HoA address similar to the target IP address. Then the attacker sends a Binding Update with its real IP as CoA and the target IP address as HoA as shown in Figure 2.3. The attacker then waits for the Binding Updates to expire, which will cause the Correspondent node to redirect the data traffic to the target IP address. The attacker can keep the stream alive by spoofing acknowledgements. Strong authentication for the identity of the machine and the association with its home address can prevent this type of attack. :Target : Attacker :Cn Spoofed BU BA Data Data after BU expiry Figure 2.3: Attack Using HoA to Send Unwanted Data to Any Host [1] Attacker (fake Mn) Cn : spoofed BU [Target address as attacker s HoA, Attacker s CoA, t] [2] Cn Attacker: BA 22
40 Attack Using CoA to Send Unwanted Data to Any Host This is similar to the type of the attack mentioned above only that in this sort of attack an attacker can choose any arbitrary address as its Care of Address (CoA) and thus target any Internet node. An attacker claims to be a Mobile node with the CoA similar to the target IP address. Ingress filtering in the attacker's local network can control the problem but not solve it. Ingress filtering prevents the spoofing of source addresses but the attack is still possible if the attacker in the same network of the targeted address. An attacker can also target one or more IP addresses within the network by using this attack and the above one in tandem. Strong authentication of real IPv6 addresses is needed to mitigate this type of attack Attacks when Binding Update Signals are Authenticated and Secured This type of attack usually is related to a particular security protocol like the attacks that exploit the Return Routability protocol which are explained in section and also related to the attacks that exploit the security solutions, which are explained in section 2.4. However Replay Attack should be considered in any security solution proposed for Mobile IPv6. The next section explains the Replay attack in Mobile IPv6. Other attacks will be explained in section and Replay Attack in Mobile IPv6 Any protocol that authenticates Binding Update signals will have to consider Replay Attack (WIKIPEDIA, 2007c), that is, an attacker may be able to replay recent authenticated Binding Updates to the Correspondent node and, that way, direct packets to the Mobile 23
41 node's previous location. What happens is that an attacker can capture the packets and impersonate the Mobile node if it reserves the Mobile node's previous address after the Mobile node has moved away and then replays the previous Binding Update to redirect packets back to the previous location as shown in Figure 2.4. The attack is a concern if the Mobile node is moving so frequently that it sends the next Binding Update before the previous Binding Update has expired. :Mn : Attacker :Cn BU1 BA 1 before BU1 expiry BU2 BA 2 Figure 2.4: Replay Attack [1] Mn Cn: BU1 (Binding with the Mobile node s current CoA) [2] Cn Mn: BA 1 [3] Attacker Cn: BU2 (Binding with the Mobile node s previous CoA) [4] Cn Attacker: BA1 Because of these attacks, the Mobile IP group has to design security protocols to secure the Binding Update signals. These security protocols are explained in the next section. 24
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Mobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
IMPROVING SERVICE REUSABILITY USING ENTERPRISE SERVICE BUS AND BUSINESS PROCESS EXECUTION LANGUAGE AKO ABUBAKR JAAFAR
IMPROVING SERVICE REUSABILITY USING ENTERPRISE SERVICE BUS AND BUSINESS PROCESS EXECUTION LANGUAGE AKO ABUBAKR JAAFAR A project report submitted in partial fulfillment of the requirements for the award
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
Security issues with Mobile IP
Technical report, IDE1107, February 2011 Security issues with Mobile IP Master s Thesis in Computer Network Engineering Abdel Rahman Alkhawaja & Hatem Sheibani School of Information Science, Computer and
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Introduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras [email protected] GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH
EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Boosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING A thesis submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Sciences (Software Engineering) FACULTY OF COMPUTER
SPAM FILTERING USING BAYESIAN TECHNIQUE BASED ON INDEPENDENT FEATURE SELECTION MASURAH BINTI MOHAMAD
SPAM FILTERING USING BAYESIAN TECHNIQUE BASED ON INDEPENDENT FEATURE SELECTION MASURAH BINTI MOHAMAD A project report submitted in partial fulfillment of the requirements for the award of the degree of
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
Mobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction [email protected] 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN
i INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Science
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA
LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY A project report submitted
DEVELOPING AN ISP FOR HOTEL INDUSTRY: A CASE STUDY ON PUTRA PALACE HOTEL
DEVELOPING AN ISP FOR HOTEL INDUSTRY: A CASE STUDY ON PUTRA PALACE HOTEL A report submitted to the Graduate School in partial fulfillment of the requirement for the Degree Master of Science (Information
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA A thesis submitted in fulfillment of the requirement for the awards of Bachelor of Computer Science (Computer Systems & Networking) with Honours Faculty of
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
PRODUCTIVITY IMPROVEMENT VIA SIMULATION METHOD (MANUFACTURING INDUSTRY) HASBULLAH BIN MAT ISA
PRODUCTIVITY IMPROVEMENT VIA SIMULATION METHOD (MANUFACTURING INDUSTRY) HASBULLAH BIN MAT ISA Thesis submitted in fulfillment of the requirements for the award of the degree of Bachelor of Mechanical Engineering
LinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
DEVELOP AND DESIGN SHEMATIC DIAGRAM AND MECHANISM ON ONE SEATER DRAG BUGGY MUHAMMAD IBRAHIM B MD NUJID
DEVELOP AND DESIGN SHEMATIC DIAGRAM AND MECHANISM ON ONE SEATER DRAG BUGGY MUHAMMAD IBRAHIM B MD NUJID A report in partial fulfillment of the requirements For award of the Diploma of Mechanical Engineering
Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.
Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
A STUDY OF SECURITY LIMITATIONS IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION
A STUDY OF SECURITY LIMITATIONS IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION By ARUMUGAM BALASUNDARAM Thesis Submitted to the School of Graduate Studies,, in Fulfillment of the Partial Requirements for
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Security with IPv6 Explored. U.S. IPv6 Summit 20032. Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security
Security with IPv6 Explored U.S. IPv6 Summit 20032 December 8-11, 8 2003 Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols
BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE
BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER SYSTEM & SOFTWARE ENGINEERING UNIVERSITI
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
IPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
IPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Car Rental Management System (CRMS) Lee Chen Yong
Car Rental Management System (CRMS) Lee Chen Yong This report is submitted in partial fulfillment of the requirement for the Bachelor of Computer Science (Database Management) FACULTY OF INFORMATION AND
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Static and Dynamic Network Configuration
CHAPTER 6 This chapter describes: Static Networks Dynamic Networks Static Networks The mobile access router can be part of a static network or a dynamic network. A static network supports stub routers
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
SHISA: The IPv6 Mobility Framework for BSD Operating Systems
SHISA: The IPv6 Mobility Framework for BSD Operating Systems Keiichi Shima Internet Initiative Japan Inc. Ryuji Wakikawa, Koshiro Mitsuya, Keisuke Uehara Keio University Tsuyoshi Momose NEC Corporation
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
VRRP Technology White Paper
Issue 01 Date 2012-08-31 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]
IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
Network Address Translation (NAT) Good Practice Guideline
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
Mobility Management in DECT/IPv6 Networks
Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
THE FINGERPRINT IDENTIFICATION OF ATTENDANCE ANALYSIS & MANAGEMENT. LEE GUAN HENG (Software Engineering)
THE FINGERPRINT IDENTIFICATION OF ATTENDANCE ANALYSIS & MANAGEMENT LEE GUAN HENG (Software Engineering) This project is submitted in partial fulfillment of the requirements for the degree of Bachelor of
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Ad Hoc Distributed Servers. Michal Szymaniak Guillaume Pierre Mariana Simons Nikolova Maarten van Steen
Ad Hoc Distributed Servers Michal Szymaniak Guillaume Pierre Mariana Simons Nikolova Maarten van Steen Problem Large scale distributed system E.g., CDN, Desktop Grid, P2P Node properties: Distributed over
Chapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
MASTER S PROJECT REPORT SUMMARY
MASTER S PROJECT REPORT SUMMARY LEVEL OF SERVICE (LOS) FOR MULTILANE HIGHWAY AND ROAD ACCIDENT INFORMATION SYSTEM DEVELOPMENT OF BATU PAHAT AREA (LORIS) Prepared by: Mohd Ezree Bin Abdullah Master of Engineering
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
