Open Access Open Access  Restricted Access Subscription or Fee Access

Security Issues in Mobile Communication with MIPv6: A Survey

J. Isac Gnanaraj, L. Arockiam

Abstract


Achieving secured mobile communication is the most important job nowadays, while mobile communication becomes an essential part of human life. Special features like Route Optimization and enhanced address formats make the Mobile IPv6 very famous and a dominant part in the mobile communication area. There are so many advanced features available in Mobile IPv6. When the number of users increases, simultaneously new security threats also appear. Introduction of Route Optimization increases the performance of the communication by avoiding triangular routing which is available in former version of Mobile IP (i.e. MIPv4) at the same time it introduces new security threats also. Route Optimization follows a new route which may not be familiar for the nodes. The nodes may be at any area of the Internet and they may have not previous relationship among them. Securing this kind of route and the packet transfer is more critical. Many researchers found solutions for securing the Mobile IPv6 communications. But unfortunately, they have some drawbacks which cannot provide 100% security. In this paper, many security threats and solutions given by various researchers are analyzed.

Keywords


IPSec, Mobile IPv6, RRP, Security,

Full Text:

PDF

References


Johnson D, Perkins C, Arkko J, “Mobility Support in IPv6”, IETF RFC3775

James Kempf, Jari Arkko, Pekka Nikander, “Mobile IPv6 Security”, International Journal of Personal Communications, Vol. 29, Issue 3, 2004, pp. 389-414

Khaled Elgoarany, Mohamed Eltoweissy, “Security in Mobile IPv6 : A Survey”, Information Security Technical Report – Elsevier, Vol. 12(1), 2007, pp. 32-43

Tuomas Aura, Michael Roe, "Designing the Mobile IPv6 Security Protocol", Technical Report 2006, Microsoft Research, UK

Marc Blanchet, “Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks”, John Wiley & Sons, Inc., Publication, 2006, ISBN 0-471-49892-0

Rajeev S Koodli, Charles E Perkins, "Mobile Inter-Networking with IPv6: Concepts, Principles, and Practices", John Wiley & Sons, Inc., Publication, 2007

Yen-Cheng Chen, Fu-Chen Yang, "An Efficient MIPv6 Return Routability Scheme Based on Geometric Computing", International Journal of Electronics, Communications and Computer Engineering, Vol.1, No.4, 2009, ISSN: 2073-0543, pp. 138-143

Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou,Robert H. Deng, "Routing optimization security in mobile IPv6",Elsevier - Computer Networks, 50 (2006), pp. 2401–2419

Jung-Doo Koo, Dong-Chun Lee, “Extended Ticket-based Binding Update (ETBU) Protocol for Mobile IPv6 (MIPv6) Networks”, IEICE Transactions on Communications, Vol.E90-B, No.4, April 2007

J. Arkko, V. Devarapalli, F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents", IETF RFC 3776, 2004.

S. Kent, K. Seo, "Security Architecture for the Internet Protocol", IETF RFC 4301, 2005.

S. Kent, "IP Authentication Header", IETF RFC 4302, 2005

S. Kent, "IP Encapsulating Security Payload (ESP)", IETF RFC 4303, 2005

D. Harkins, D. Carrel, “The Internet Key Exchange”, IETF RFC 2409, 1998

Silvia Hagen, “IPv6 Essentails”, O’Reilly Media publications, 2002, ISBN: 978-0-596-00125-4

D. Maughan, M. Schertler, M. Schneider, J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", IETF RFC 2408, 1998

H. Orman, “The OAKLEY Key Determination Protocol”, IETF RFC 2412, 1998

P. Ferguson, D. Senie, “Network Ingress Filtering - Defeating Denial of Service Attacks which employ IP Source Address Spoofing”, IETF RFC 2827, 2000

SuGil Choi, Kwangjo Kim, ByeongGon Kim, "Practical Solution for Location Privacy in Mobile IPv6", Proceedings of International Workshop on Information Security Applications, Springer-LNCS 2908, pp. 69–83, 2004

Tianhan Gao, Nan Guo, Zhiliang Zhu, "Policy-based Distributed Security Management Scheme in MIPv6",Proceedings of International Conference on Computer Science and Software Engineering, 2008, pp. 915-918

R Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin, "A Robust Return Routability Procedure for Mobile IPv6", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008, pp.234-240

Christian Veigner, Chunming Rong, "Flooding Attack on the Binding Cache in Mobile IPv6", Springer - Communications in Computer and Information Science, 2007, Volume 3, Part 3, pp.187-200, DOI: 10.1007/978-3-540-75993-5_16


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.