Early Binding Updates and Credit-Based Authorization A Status Update



Similar documents
Efficient End-to-End Mobility Support in IPv6

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

First Midterm for ECE374 03/24/11 Solution!!

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

TCP over Wireless Networks

Mobility on IPv6 Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

SJBIT, Bangalore, KARNATAKA

Data Networks Summer 2007 Homework #3

Boosting mobility performance with Multi-Path TCP

REDUCING PACKET OVERHEAD IN MOBILE IPV6

High-Speed TCP Performance Characterization under Various Operating Systems

Tomás P. de Miguel DIT-UPM. dit UPM

First Midterm for ECE374 03/09/12 Solution!!

A Network-Controlled Architecture for SCTP Hard Handover

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Network Friendliness of Mobility Management Protocols

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

TCP in Wireless Mobile Networks

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

Transport Layer Protocols

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

Mobile IP Part I: IPv4

Ad Hoc Distributed Servers. Michal Szymaniak Guillaume Pierre Mariana Simons Nikolova Maarten van Steen

2 TCP-like Design. Answer

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile Internet Protocol v6 MIPv6

TCP PACKET CONTROL FOR WIRELESS NETWORKS

Final for ECE374 05/06/13 Solution!!

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

IxLoad: Advanced VoIP

Low-rate TCP-targeted Denial of Service Attack Defense

17: Queue Management. Queuing. Mark Handley

TCP for Wireless Networks

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

DDoS Vulnerability Analysis of Bittorrent Protocol

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

TCP Adaptation for MPI on Long-and-Fat Networks

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

IPv6 mobility and ad hoc network mobility overview report

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

TCP Westwood for Wireless

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

TCP in Wireless Networks

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Mobile Communications Chapter 9: Mobile Transport Layer

NAT TCP SIP ALG Support

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

A Study on TCP Performance over Mobile Ad Hoc Networks

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Wireless Networks: Network Protocols/Mobile IP

The Fundamentals of Intrusion Prevention System Testing

Network Mobility Support Scheme on PMIPv6 Networks

Network management and QoS provisioning - QoS in the Internet

About Firewall Protection

Performance Evaluation for Mobility Management Protocols in Cellular IP and Hawaii Mobile Networks

A Study on Mobile IPv6 Based Mobility Management Architecture

Active Queue Management (AQM) based Internet Congestion Control

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian

Frequently Asked Questions

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestions and Control Mechanisms n Wired and Wireless Networks

Key Components of WAN Optimization Controller Functionality

SIP Trunking Manual Technical Support Web Site: (registration is required)

Virtual Private Network Using Peer-to-Peer Techniques

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Monitoring and analyzing audio, video, and multimedia traffic on the network

Denial-of-Service Shrew Attacks

Performance Issues of TCP and MPEG-4 4 over UMTS

Requirements of Voice in an IP Internetwork

An Improved TCP Congestion Control Algorithm for Wireless Networks

Supporting VoIP in IEEE Distributed WLANs

RTT 60.5 msec receiver window size: 32 KB

ETM System SIP Trunk Support Technical Discussion

Transcription:

Status update New drafts Implementation Experimentation results Early Binding Updates and Credit-Based Authorization A Status Update

Why Do We Need Enhancement? Mobile IPv6 Route Optimization uses return-routability procedure to authorize binding between Home address == Who I am C/o address == Where I am Idea: Verify MN's reachability at home address for authentication c/o address for binding authorization Handoff delays btw. 3 and 4 RTT depends on degree of parallelism that implementation use Reduce this! 1

Enhancement Approaches 2 Early Binding Updates Modification to Mobile IPv6 binding-update procedure Proactivity Concurrency Higher degree of parallelism Reduces handoff latency to 1 RTT for reactive handoffs to 0~1 RTT for proactive handoffs Credit-Based Authorization Strategy followed by CN Determines data that CN can securely send to MN before MN's reachability at new c/o address verified

Standard Mobile IPv6 include tokens authenticated w/both tokens 3

Standard Mobile IPv6 3 RTT in parallel optimistic approach 4 RTT 4 switch to new c/o address switch to new c/o address

Mobile IPv6 + Early Binding Updates Home Test (Init) exchange prior to handoff home and correspondent registration simultaneously Care-of Test (Init) exchange in parallel with data tentative registration of new c/o address without c/o test deferred full registration of new c/o address 5

Mobile IPv6 + Early Binding Updates switch to new c/o address switch to new c/o address 1 RTT 6

However CN sends packets to unverified location period of vulnerability requires additional protection 7

Why This Is An Issue 8 Attacker could establish a higher-layer connection (e.g., download) redirect packets to victim spoof TCP acknowledgments Amplification! CN generates large data packets Attacker sends small ACKs Without amplification Flooding no more effective than direct flooding Direct flooding always possible

and How It Can Be Solved Idea Limit packets sent to unverified c/o address so as to not cause amplification Solution Count the bytes received from MN/attacker Send no more bytes to unverified c/o address 9 Credit-Based Authorization Byte counter == "Credit account"

Credit-Based Authorization Mobile Node Correspondent Node Acquires credit by sending pkts. Consumes credit for being sent pkts. to unverified addr. Maintains credit account 10

Credit-Based Authorization Mobile Node Correspondent Node 11

Credit-Based Authorization Mobile Node Correspondent Node 12

Credit-Based Authorization Mobile Node Correspondent Node 13

Credit-Based Authorization Mobile Node Correspondent Node 14

Credit-Based Authorization Mobile Node Correspondent Node 15

Credit-Based Authorization Mobile Node Correspondent Node 16

Credit-Based Authorization Mobile Node Correspondent Node Detach Attach c/o address unverified 17

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 18

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 19

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 20

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 21

Credit-Based Authorization Mobile Node Correspondent Node 22 c/o address unverified

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 23

Credit-Based Authorization Mobile Node Correspondent Node c/o address unverified 24

However Credit account allows an attacker to accumulate credit over a long time at a slow rate, and use this credit all at once Facilitates large burst of packets from attackers with low-bandwidth Internet access Credit aging prevents this 25

Credit Aging credit exponential aging CN learns new c/o address new c/o address unverified time new c/o address becomes verified 26

Experimental Evaluation global RTTs and bandwidths MAC filter 27 Handoff delays w/ip telephony Handoff delays w/tcp file transfers Throughput of TCP file transfers Analysis of TCP benefits

IP Telephony: Parameters 28 Application 64 kbps payload 10ms chunks 164B per packet (IPv6, extensions, UDP, RTP) bidirectional Network 200ms round-trip time Mobility protocols standard (conservative) Mobile IPv6 optimistic Mobile IPv6 w/early Binding Updates and Credit-Based Authorization Confidence 500 handoffs per mobility protocol

Handoff Delay w/ip Telephony RTT == 200 ms 1 RTT + ε 3 RTT + ε 4 RTT + ε 29

TCP File Downloads: Parameters 30 Application 60s download (chargen-generated data) 1024 kbps bandwidth unidirektional TCP Reno Network 40ms to 200ms round-trip time Mobility protocols standard (conservative) Mobile IPv6 optimistic Mobile IPv6 w/early Binding Updates and Credit-Based Authorization Confidence 20 experiments per mobility protocol per round-trip time 5 handoffs per experiment

Handoff Delay w/tcp File Transfers 31

Throughput w/tcp File Transfers Why does TCP benefit so much? 32

Why TCP Benefits So Much 1st timeout new c/o address 1st timeout old c/o address 2nd timeout new c/o address ebu/cba conserv 33

Why TCP Benefits So Much (2) TCP behavior after 1st timeout set cwnd = 1 set ssthresh = flightsize do Slow Start until cwnd > ssthresh TCP behavior after 2nd timeout set cwnd = 1 set ssthresh = 2 (minimum) effectively skip Slow Start 34

New Drafts draft-vogt-mobopts-simple-ebu-00.txt includes diff's to RFC 3775 specifies support for proactive handoffs no IANA requirements draft-vogt-mobopts-simple-cba-00.txt transparent to MN no signaling no IANA requirements 35

No IANA Requirements 36 Early BU == BU where Kbm == SHA1(home keygen token) Care-of Nonce Index == 0 Early BA accordingly CN w/ebu support checks Nonce Indices option Care-of Nonce Index == 0? early Binding Update Care-of Nonce Index!= 0? standard Binding Update CN w/o EBU support sends BA w/status 137, "Expired care-of nonce index" or sends no BA due to Authentication failure MN sets Acknowledge flag in early BU

Conclusion 37 Advantages of EBU/CBA Reduce handoff delays to 0~1 RTT (L3 only) Better accommodate TCP's retransmission algorithm No special network support required Applicable to inter-domain handovers Drawbacks of EBU Additional signaling, especially for proactive home-address tests if done periodically Still 1 RTT latency for reactive handoffs Still 0~1 RTT latency for proactive handoffs

Acknowledgment Many thanks to my students for their eager and reliable co-operation: Ralf Beck Daniel Jungbluth Max Laier 38