70 likes | 199 Views
A Scheme for MN-MAP Security in HMIPv6. draft-qiu-mipshop-mn-map-security-00.txt Jianying ZHOU Feng BAO, Robert DENG, Ying QIU Institute for Infocomm Research, Singapore. HA. CN. Internet. MAP. AR2. AR1. movement. MN. MAP’s Domain. Why need security between MN and MAP?.
E N D
A Scheme for MN-MAP Security in HMIPv6 draft-qiu-mipshop-mn-map-security-00.txt Jianying ZHOU Feng BAO, Robert DENG, Ying QIU Institute for Infocomm Research, Singapore
HA CN Internet MAP AR2 AR1 movement MN MAP’s Domain Why need security between MN and MAP? • When CN sends packets to MN's RCoA, MAP intercepts the packets and forwards them to MN's LCoA. • Redirect Attacks: if BU message from MN to MAP is not authenticated when MN changes its AR, an attacker can redirect traffic from MAP to fake destinations. • Only the authorized users can use the MAP HA: Home Agent CN: Correspondent Node MAP: Mobility Anchor Point AR: Access Router MN: Mobile Node
MN MAP Cookie0 Cookie1 long term messages BU1 BA1 BUi short term messages BAi How to Provide MN-MAP Security? Authentication-only Mode In this mode, a MAP only needs to ensure that the same MN is sending the BUs to the MAP. It is not necessary for the MN to prove that it is authorized to use a MAP to manage its mobility. • Cookie0 = {Src=LCoA, Des= MAP, Opt=HoA, C0} • Cookie1 = {Src=MAP, Des=LCoA, Opt=HoA, C0, C1, N1}. • BU1 = {Src=LCoA, Des=MAP, Opt=HoA, C0, C1, N1, N2, TS, SIGMN, CertMN}, • SIGMN = Sig(SKMN, LCoA|HoA|MAP|N1|N2|TS). • BA1 = {Src=MAP, Des=LCoA, Opt=HoA, RCoA, C0, C1, N1, N2}, • BUi = {Src=LCoA, Des=MAP, Opt=HoA, old_LCoA, TS, SIGMN_i} • SIGMN_i = Sig(SKMN, LCoA|MAP|HoA|old_LCoA|TS). • BAi = {Src=MAP, Des=LCoA, Opt=HoA}
MN MAP HA Cookie0 Cookie1 long term messages BU1 Req_cert Rep_cert BA1 BUi short term messages BAi How to Provide MN-MAP Security? Authentication & Authorization Mode • In this mode, the MAP and the MN need to know that the other end is "trusted". The MAP also needs to know if the MN is authorized for using it. • All 3 parties need certificates; MN’s is issued by its HA • Both MAP and HA only need to store a few trusted CAs’ public keys. • Similar to SSL, no global PKI is need here.
MN MAP HA Cookie0 Cookie1 BU1 Req_cert Rep_cert BA1 BUi BAi How to Provide MN-MAP Security? Authentication & Authorization Mode • BU1 = {Src=LCoA, Des=MAP, Opt=HoA, C0, C1, • N1, N2, TS, gx, SIGMN, CertMN}, • SIGMN = Sig(SKMN, LCoA|HoA|MAP|gx|N1|N2|TS) • CertMN = {HoA, PKMN, Valid_Iinterval, SIGHA} • Req_Cert = {Src=MAP, Des=HA, request_cert} • Rep_Cert = {Src=HA, Des=MAP, CertHA} • BA1 = {Src=MAP, Des=LCoA, Opt=HoA, RCoA, C0, C1, gy, SIGMAP, CertMAP} • SIGMAP = Sig(SKMAP, LCoA|HoA|MAP|gy|BU1) • CertMAP = {MAP, PKMAP, Valid_Iinterval, SIGCA} • BUi = {Src=LCoA, Des=MAP, Opt=HoA, old_LCoA, TS, SIGMN_i} • BAi = {Src=MAP, Des=LCoA, Opt=HoA, SIGMAP_i}
Conclusion • The proposal considers security issues in binding update between mobile nodes and a mobility anchor point. • Proposed solution for the above, with two security modes for different scenarios. • Authentication of MN without the global PKI.
Q & A Thank You