INTEGRATING IDENTITY-BASED ENCRYPTION (IBE) IN THE RETURN ROUT ABILITY PROTOCOL (RRP) TO ENHANCE SIGNALS SECURITY IN MOBILE IPv6

Loading...
Thumbnail Image
Date
2010-05
Authors
S. ALSAYFI, MAJED SALAM
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Mobile IPv6 allows a node to move from one network to another network without any disruption in communication at the node. Mobile IPv6 consists of the Mobile Node, the Correspondent Node and the Home Agent. The authentication procedure between nodes is very important so as to achieve secure packet transfer and a secure Internet that supports mobility. Return Routability Protocol is a mechanism used in Mobile 1Pv6 to provide the nodes with some authentication. The Return Routability Protocol is not sufficiently secured so as to provide enough protection between the mobile and the correspondent nodes in Mobile 1Pv6. The attacker, particularly an agent acting as a Man- In-The-Middle attack, can easily intercept and replay packets and even modify packets between the mobile and the correspondent nodes. The correspondent node does not know whether a packet has come from a valid mobile node or a malicious node. Similarly, the mobile node does not know if the packet has come from a valid correspondent node or an attacker. Thus, the level of trust between the nodes is weak/low. The Mobile 1Pv6 will not function properly if the authentication between mobile and correspondent nodes fails. This thesis proposes the use of Identity-Based Encryption as a means to enhance security and authentication in the Return Routability Protocol. Identity-Based Encryption is a security mechanism which requires a third party (i.e. Private Key Generator) to distribute these types of keys. The enhancement in the Return Routability Protocol between the mobile and the correspondent nodes has resulted in strong authentication and security. The proposed Return Routability-Identity-Based Encryption (RR-IBE) protocol was evaluated using the xviii CMmphi Security Model Checker. This protocol (RR-IBE) is clearly prevents the Man-InThe- Middle from attacking the security of the nodes and obtains the authentication between the nodes (i.e. the mobile and the correspondent nodes).
Description
Keywords
INTEGRATING IDENTITY-BASED ENCRYPTION (IBE)
Citation