DocumentCode :
1207881
Title :
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks
Author :
Fathi, Hanane ; Shin, SeongHan ; Kobara, Kazukuni ; Chakraborty, Shyam S. ; Imai, Hideki ; Prasad, Ramjee
Author_Institution :
Center for TeleInFrastruktur, Aalborg Univ., Denmark
Volume :
23
Issue :
11
fYear :
2005
Firstpage :
2182
Lastpage :
2193
Abstract :
The coupling of mobility and quality-of-service with security is a challenge that should be addressed in future wireless overlay systems. The mobility of a node can disrupt or even intermittently disconnect an ongoing real-time session because a secure handover must be performed to ensure continuous connectivity. The duration of the such interruptions is called disruption time or handover delay and can heavily affect the user satisfaction. The handover procedure needs to protect its integrity and confidentiality-otherwise, the packets may be rerouted to a malicious node and the legitimate handover may not be performed. The security procedure to ensure this should not lengthen significantly the handover delay to provide good quality real-time services. In this paper, we focus on the network-layer mobility, specifically, on Mobile Internet protocol version 6 (MIPv6) since it is the natural candidate for providing such mobility in future systems. To solve the problem of on-path attackers and prevent leakage of secrets, we propose a security architecture for MIPv6 based on leakage resilient-authenticated key establishment (LR-AKE) protocol and its cooperation with public key infrastructure. The proposed architecture prevents against on-path attackers which was not addressed in the specifications of MIPv6, and also provides robustness against leakage of secret values. Using analytical models, we evaluate MIPv6 handover delay for real-time services. We identify the crucial factors affecting the handover delay among transmission delays of MIPv6, security and LR-AKE messages, queueing delays and en/decryption delays.
Keywords :
IP networks; authorisation; message authentication; mobile computing; public key cryptography; quality of service; real-time systems; telecommunication security; transport protocols; LR-AKE protocol; disruption time; encryption-decryption delay; handover delay; leakage-resilient security architecture; mobile IPv6; mobile internet protocol version 6; mobility coupling; on-path attacker; public key infrastructure; quality-of-service; queueing delay; real-time service; resilient-authenticated key establishment; wireless overlay network; Communication system security; Delay effects; IP networks; Intelligent networks; Protection; Protocols; Public key; Quality of service; Robustness; Web and internet services; Authenticated key exchange; IP-based wireless overlay networks; handover delay; leakage-resilience; mobile IPv6 (MIPv6); security;
fLanguage :
English
Journal_Title :
Selected Areas in Communications, IEEE Journal on
Publisher :
ieee
ISSN :
0733-8716
Type :
jour
DOI :
10.1109/JSAC.2005.856838
Filename :
1525168
Link To Document :
بازگشت