Authentication In Mobile Internet Protocol version 6 Liu Ping Supervisor: professor Jorma Jormakka

advertisement
Authentication In Mobile
Internet Protocol version 6
Liu Ping
Supervisor: professor Jorma Jormakka
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Present solution
6. Conclusion
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Solution
6. Conclusion
• Motivation
1. Mobile device and Ebusiness
2. Current solutions are fairly completed to be
implemented
• Related work
1. Strong authentication: PKI
2. Weak authentication: CGA, CAM and RR
• Our solution
Based on asymmetric and symmetric
encryption algorithm to distribute an ID and
a session key
• CGA: Cryptographically
Generated Address
• CAM: Child-proof
Authentication for MIPv6
• RR: Return Routability
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Solution
6. Conclusion
• MN: Mobile Node, it is MIPv6
• CN: Correspondent Node is
communicating node with a MN, it is
either stationary node or mobile node
• HA: Home Agent, a router is on a MN’s
home link. It registers all necessary
information for a MN, i.g. CoA, HoA
• CoA: A MN’s Care-of Address, which is
temporary and a foreign link assigns to
the MN on the foreign link
• HoA: A MN’s permanent IPv6 address
on its home link
Bidirectional tunneling
MN
HA
CN
Route Optimization
MN
CN
• Need a binding process: MN sends CoA
to its HA and CNs when it’s out of its
home link
• CN saves the MN’s CoA into its BUCbinding update cache
• CN can deliver a packet to the MN
directly by setting the packet’s source
address to be the MN’s CoA
• Route optimization can reduce
congestions of the MN’s home link and
HA, but introduces new vulnerabilities
BU process
BU message’s header
CN’s BU entry
Source IP
HoA
Destination IP
CoA
HoA option
……(CoA)
……
1. HoA: a MN’s HoA cannot be abused
2. CoA: CN’s BUC must save correct
MN’s CoA
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Solution
6. Conclusion
Security Mechanisms
• Authorization and trust
• Authentication
• Integrity
• Confidentiality
• Anti-replay
• Authorization and trust: A CN verifies
whether a MN has right to create or
update its BUC
• Authentication: MN and CN can verify
their identifies
• Integrity: BU message cannot be
modified by an unauthorized node
• Confidentiality: CoA and HoA cannot be
disclosed to malicious nodes
• Anti-replay: An attacker delivers old,
out-of date packet to CN by pretending
to be a MN
BUC
::20:10:10:10
MN
BU
CN
HoA
CoA
False BU
::30:10:10:10
MN
::40:10:10:10
attacker
Source address: ::30:10:10:10
Destination address: ::CN’s IP
address
Home address option: MN’s
home address
Threats analysis
•Man-In-the-Middle
attack
•Denial of Service
attack
Man-In-the-Middle attack
A
B
Attacker
Denial Of Service Attack
MN
CN
Attacker
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Solution
6. Conclusion
1. A MN’s HoA works
as a searching key
during BU process
2. A MN’s HoA must be
secret enough,
otherwise, attacker
can launch a
passive or an active
attack easily by
sending a false BU
message to a CN
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Solution
6. Conclusion
Solution Overview
• Using an ID shared only with a pair
MN and CN as a searching key
• Apply RSA asymmetric to
distribute an ID and a session key
• Apply Twofish symmetric
algorithm to encrypt/decrypt CoA
during BU process
Authentication in MIPv6
Apply in MIPv6
Preparation
Binding Update
Verifying
Preparation Procedure
MN generates public/private key
Public key
MN-----------------------------------CN
[ID, session key] public
MN<---------------------------------CN
MN saves the ID and session key
Binding update procedure
[CoA] session & ID
MN---------------------------------CN
CN’s BU entry
ID
Session key
CoA
CN decrypts CoA by session
Public key
……
CN verifies CoA and saves
Verify procedure
• An attacker
It is failed because of IPsec
protection (without a SA
shared with CN before). An
attacker cannot do any more
harmful thing.
Verify procedure
• An cheater: has a SA before
ID
ID or session key
is not correct,
Session key CN drops packet.
Compares CoA and
CoA
source address
1. Introduction
2. Mobility support
3. Security mechanisms
and threats analysis
4. Address ownership
problem
5. Present solution
6. Conclusion
Summary
• Solve address ownership
problem
• Prevent possible attacks
• Implementation simple
• Suitable any kinds of computer
and memory
• It is difficult to recognize a
cheater
Future work
1. Combine software and
hardware
2. Ciphertext error
• Transmission process
• Storage medium
• Recover plaintext from errors
Thank you
Download