420 likes | 538 Views
Overview of Mobility Protocols. Md. Shohrab Hossain July 12, 2013. Why M obility Protocols. Satellites with IP-enabled devices capture videos, images and send them to control centers on earth Need to maintain continuous connectivity with remote computer
E N D
Overview ofMobility Protocols Md. Shohrab Hossain July 12, 2013
Why Mobility Protocols • Satellites with IP-enabled devices capture videos, images and send them to control centers on earth • Need to maintain continuous connectivity with remote computer • Mobility protocols are required to ensure session continuity
IETF Solution to IP Mobility: Mobile IP Correspondent Node (CN) • Employs mechanism similar to postal service mail forwarding • Problems: • Inefficient routing • High handover latency • Packet loss Home Agent Packets from CN to MH Internet Encapsulated Packets Location Update Foreign Agent Home Network Decapsulated Packets Home Address Acquires CoA Visiting Network
Network Mobility (NEMO) • A collection of nodes moving as a unit (Example: airplanes, trains, ships) • Mobility can be managed in an aggregated way in NEMO • Mobile Router acts as default gateway and manages mobility on behalf of mobile network nodes HA
NEMO Architecture • Inside NEMO • MR: Mobile Router • LFN: Local Fixed Node • LMN: Local Mobile node • VMN: Visiting Mobile Node • Problems: • Routing through HA • Heavy load on HA • Drop in throughput during handover Data path NEMO
SIGMA • Transport layer solution proposed by the researchers at the TNRL lab • Exploits IP-diversity (having multiple IP addresses) of a mobile host • Benefits: • Establishes a new connection before disconnecting the old one • Decouples location management from data transmission • Less handover delay and packet loss, Optimal routing between MH-CN CN LocationManager
SINEMO • SIGMA-based seamless mobility solution for mobile networks • Exploits IP-diversity of the MR • The MR maintains a translation table for all the mobile network nodes • MNN’s private IPs do not change Default gateway
Hierarchical Mobility Protocols: HMIPv6 • For high mobility of nodes, frequent location updates for HA • Bandwidth wastage • Overhead for HA • Hierarchical Mobile IPv6 attempts to reduce signaling by introducing new Mobility agent: MAP Local HA Local HA
Hierarchical Mobility Protocols: HiSIGMA Micro Mobility Macro Mobility
Terminal-based Mobility Protocol: Mobile IP Correspondent Node (CN) • Employs mechanism similar to postal service mail forwarding • Problems: • MH must send updates to HA • CoA changes in every handoff • High handover latency • Packet loss Home Agent Packets from CN to MH Internet Encapsulated Packets Location Update Foreign Agent Home Network Decapsulated Packets Home Address Acquires CoA Visiting Network
Problems of Terminal-based Mobility Protocols • Problems: • Requires low-end mobile devices to perform all kinds of mobility signaling to maintain connectivity • New CoA after each handoff, so the cache entry needs to be changed • Wireless bandwidth wastage due to mobility signaling • High handover latency • Sub-optimal routing and tunneling • Solution: Network-based Mobility Management • Network takes care of all the mobility signaling • Network entities are responsible to track the mobile device • Network entities send required signaling messages on behalf the mobile devices
Proxy Mobile IP: Network-based Mobility Management • Local Mobility Anchor • Local HA for the MH in a PMIPv6 domain • All traffic destined to are routed through LMA • Mobility Anchor Gateway • Access router that tracks MH’s movement in its access link • Informs the LMA through Proxy BU Local Home Agent Access Router that detects node mobility PMIPv6domain
PMIPv6 Operation Binding Cache entry for MH Proxy BU AAA procedure Proxy BA PMIPv6domain Router Solicitation
Proxy Mobile IP Signaling AAA: Authentication, Authorization and Accounting BCE: Binding Cache Entry PBU: Proxy Binding Update PBA: Proxy Binding Ack
Benefits of Network-based Mobility Management • Battery power saving • No modification in end devices • Unique IP address in the whole LMA-domain • Movement detection by the network • Reduced signaling in the wireless access network • Low handover latency • Efficient tunneling • Less signaling in each handoff • No Duplicate Address Detection (DAD) in each handoff • No return routability
Route optimization in Mobile IPv6 Correspondent Node • After moving to new location, MH informs CN about its location though binding update • Improved performance Home Agent Internet Location Update Binding update to CN Optimized route without any encapsulation Home Network Visiting Network
Major Security Threats • Man-in-the-middle attack • Traffic redirection attack • Bombing Attack • Replay Attack • Home Agent poisoning • Blocking legitimate BU • Resource exhaustion • Forcing sub-optimal route • Exploitation of routing headers
Traffic Redirection Attack Correspondent Node Redirected Traffic Home Agent Node B Binding Ack accepted by CN Ongoing communication Spoofed binding update (MH’s ID, Node B’s IP) MH Attacker
Man-in-the-middle (MITM) Attack Correspondent Node Home Agent Binding Ack accepted by CN TrafficRedirected to the Attacker Ongoing Communication Spoofed binding update (MH’s ID, Attacker’s IP) MH Attacker learns and modify packets Modified packets received
Bombing Attack Streaming server Connection Setup with server Unwanted streaming data Spoofed binding update involving MH’s address MH
Replay Attack CN Home Agent MH sends BU from Subnet B Recorded BU replayed to CN MH sends BU from subnet A CN sends packets to MH’s previous location ???? Attacker records BU for future attack Moving to subnet B Subnet B Subnet A
Reflection Attack Correspondent Node Home Agent False initial message MH receives every packet sent by the attacker twice
Home Agent Poisoning Location information corrupted Reply (Wrong IP) Query for MH Spoofed BU Binding ACK
Resource Depletion Home Agent Subnet B Attacker establishes many connections with fake IPs MH sends BUs to all those fake hosts Memory and transmission power wasted Subnet A
Exploitation of Routing Header • Attack traffic sent to node B with a Routing Header (RH) • Node B overwrites destination field with RH • Traffic is then sent to victim node • Difficult to find source of attack
Exploitation of HoA Option • Attack traffic to V • Node V replaces source IP with HoA field (B) • It appears to be an attack from Node B
Defense Mechanisms • Goals • Simple enough to be implemented in mobile devices • Requiring low processing power • Low latency solutions • Infrastructure-less approach: No such global infrasturcture • Existing defense mechanisms for Mobile IPv6 • IP Security protocol • Internet Key Exchange (IKE)-based schemes • Return Routability protocol • Protection for routing headers • Other general measures
IP Security Protocols • A suite of protocols to provide security in IP networks • Authentication Header (AH) protocol • Encapsulating Security Payload (ESP) protocol • In IPsec, a preconfigured Security Associations (SA) is established between MH and HA / CN to choose security parameters / algorithms • Advantage: • Very strong authentication • Difficult to break • Limitations: • High CPU requirement • Does not protect against misbehaving MH
IPsec: Authentication Header (AH) protocol • AH guarantees data origin authentication of IP packets • Use of such AH ensures that any attacker cannot deceive HA or CN with spoofed BU • As a result, traffic redirection attacks can be avoided • Limitations: • Cannot ensure data confidentiality
IPsec: AH Operation Correspondent Node Home Agent Securing BU with AH Security Association
IPSec: Encapsulating Security Payload (ESP) protocol • ESP protocol can ensure data confidentiality in addition to authentication • ESP ensures privacy of data by encryption • An encryption algorithm combines data in the datagram with a key to transform it into an encrypted form
IPsec: Securing Data using ESP Correspondent Node Home Agent Securing data from inconsistency Security Association Securing BU with ESP
IKE-based Schemes • Commonly used for mutual authentication and establishing and maintaining security associations for IPSec protocol suite • Ensures confidentiality, data integrity, access control, and data source authentication • IKE helps to dynamically exchange the secret key that is used as the input to the cryptographic algorithms • Limitations: • Require existence of a certification authority • Very complex and power consuming operations
Return Routability Protocol • Proposed to secure binding updates between CN-MH • A node sending a binding update must prove its right to redirect the traffic • RR messages are exchanged among MH, CN and HA before binding updates are sent
Message Exchange in RR protocol • MH initiates RR by sending HoTI and CoTImsg to the CN • The CN then sends corresponding challenge packets (HoT and CoT) destined to MH • If successful, CN accepts BU from MH • Advantages • Infrastructure-less • Low CPU required • Limitations • Weak authentication • Does not protect against attackers on the path between HA and CN HoTI CoTI HoT CoT HoT HoTI
Protection against Routing Header (RH) issues • To protect misuse of routing headers, following restrictions are applied while processing RH: • Only one RH per packet • All IPv6 nodes must verify that the address contained within RH is the node’s own HoA • The IP address must be a unicast routable address since it is the MH’s HoA • A node must drop the packet if any of these are NOT met
Other possible approaches • Keeping nodes stateless: To avoid resource exhaustion • Keeping short lifetime for binding entry: To avoid replay attack • Use of Cryptographically Generated Address: To avoid redirection / MTIM attacks