By Topic

Security Analysis of Binding Update Protocols in Route Optimization of MIPv6

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kavitha, D. ; Dept. of Comput. Sci. & Eng., G.Pulla Reddy Eng. Coll.(Autonomous), Kurnool, India ; Murthy, K.E.S. ; ul Huq, S.Z.

Mobile IP version 6 (MIPv6) is an IP layer mobility protocol for the IPv6 Internet. Route Optimization (RO) in Mobile IPv6 provides a mobile node (MN) the opportunity to eliminate the inefficient triangle routing with its corresponding node (CN) and therefore, greatly improves the network performance. However, in doing so, MIPv6 introduces several security vulnerabilities, and among them a major concern is the authentication and authorization of Binding Updates (BUs) during the RO process. Unauthenticated or malicious BUs open the door for many types of attacks. As every IPv6 node is expected to support MIPv6, mechanisms to secure BU will have a significant impact on the next generation Internet. Many novel mechanisms came into existence to provide security to BU's. We had an in depth analysis of all these protocols and have categorized them into two types where one is based on Return Routability and cryptographically Generated Addresses(CGA) and the others are based on Certificate based Binding Update Protocols. In this paper, we have presented the state of art of all these protocols and also comparative study of all these protocols is made with respect to different types of attacks.

Published in:

Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on

Date of Conference:

12-13 March 2010