INTEGRATING IDENTITY-BASED ENCRYPTION (IBE) IN THE RETURN ROUT ABILITY PROTOCOL (RRP) TO ENHANCE SIGNALS SECURITY IN MOBILE IPv6
Loading...
Date
2010-05
Authors
S. ALSAYFI, MAJED SALAM
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Mobile IPv6 allows a node to move from one network to another network without
any disruption in communication at the node. Mobile IPv6 consists of the Mobile Node,
the Correspondent Node and the Home Agent. The authentication procedure between
nodes is very important so as to achieve secure packet transfer and a secure Internet that
supports mobility. Return Routability Protocol is a mechanism used in Mobile 1Pv6 to
provide the nodes with some authentication. The Return Routability Protocol is not
sufficiently secured so as to provide enough protection between the mobile and the
correspondent nodes in Mobile 1Pv6. The attacker, particularly an agent acting as a Man-
In-The-Middle attack, can easily intercept and replay packets and even modify packets
between the mobile and the correspondent nodes. The correspondent node does not know
whether a packet has come from a valid mobile node or a malicious node. Similarly, the
mobile node does not know if the packet has come from a valid correspondent node or an
attacker. Thus, the level of trust between the nodes is weak/low. The Mobile 1Pv6 will not
function properly if the authentication between mobile and correspondent nodes fails. This
thesis proposes the use of Identity-Based Encryption as a means to enhance security and
authentication in the Return Routability Protocol. Identity-Based Encryption is a security
mechanism which requires a third party (i.e. Private Key Generator) to distribute these
types of keys. The enhancement in the Return Routability Protocol between the mobile and
the correspondent nodes has resulted in strong authentication and security. The proposed
Return Routability-Identity-Based Encryption (RR-IBE) protocol was evaluated using the
xviii
CMmphi Security Model Checker. This protocol (RR-IBE) is clearly prevents the Man-InThe-
Middle from attacking the security of the nodes and obtains the authentication
between the nodes (i.e. the mobile and the correspondent nodes).
Description
Keywords
INTEGRATING IDENTITY-BASED ENCRYPTION (IBE)