Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks

被引:10
作者
Fathi, H [1 ]
Shin, SH
Kobara, K
Chakraborty, SS
Imai, H
Prasad, R
机构
[1] Aalborg Univ, Ctr TeleInFrastruktur, DK-9220 Aalborg, Denmark
[2] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
[3] Acad Finland, FIN-02015 Espoo, Finland
[4] Aalto Univ, FIN-02015 Espoo, Finland
[5] Ericsson Telecom AB, Jorvas 02420, Finland
基金
芬兰科学院;
关键词
authenticated key exchange; handover delays; IP-based wireless overlay networks; leakage-resilience; mobile IPv6 (MIPv6); security;
D O I
10.1109/JSAC.2005.856838
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The coupling of mobility and quality-of-service with security is a challenge that should be addressed in future wireless overlay systems. The mobility of a node can disrupt or even intermittently disconnect an ongoing real-time session because a secure handover must be performed to ensure continuous connectivity. The duration of the such interruptions is called disruption time or handover delay and can heavily affect the user satisfaction. The handover procedure needs to protect its integrity and confidentiality-otherwise, the packets may be rerouted to a malicious node and the legitimate handover may not be performed. The security procedure to ensure this should not lengthen significantly the handover delay to provide good quality real-time services. In this paper, we focus on the network-layer mobility, specifically, on Mobile Internet protocol version 6 (MIPv6) since it is the natural candidate for providing such mobility in future systems. To solve the problem of on-path attackers and prevent leakage of secrets, we propose a security architecture for MIPv6 based on leakage resilient-authenticated key establishment (LR-AKE) protocol and its cooperation with public key infrastructure. The proposed architecture prevents against on-path attackers which was not addressed in the specifications of MIPv6, and also provides robustness against leakage of secret values. Using analytical models, we evaluate MIPv6 handover delay for real-time services. We identify the crucial factors affecting the handover delay among transmission delays of MIPv6, security and LR-AKE messages, queueing delays and en/decryption delays.
引用
收藏
页码:2182 / 2193
页数:12
相关论文
共 12 条
[1]  
[Anonymous], 1998, 2401 RFC IETF
[2]   Performance optimization of VoIP calls over wireless links using H.323 protocol [J].
Das, SK ;
Lee, E ;
Basu, K ;
Sen, SK .
IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (06) :742-752
[3]  
EASTLAKE D, 2001, 3174 RFC IETF
[4]  
Harkins D., 1998, 2409 RFC IETF
[5]  
Housley R., 2001, PLANNING PKI
[6]  
JOHNSON D, 2004, 3775 RFC IETF
[7]  
Kent S., 1998, 2406 RFC IETF
[8]  
Kleinrock L., 1975, QUEUEING SYSTEMS VOL
[9]  
NIKANDER P, 2004, MOBILE IP VERSION 6
[10]  
Perkins C., 2002, RFC3344 IETF