Font Size: a A A

Research On Mobile IPv6 And It's Security

Posted on:2006-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:H N ZhaoFull Text:PDF
GTID:2178360185963331Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Computer network attack is playing an important role in information war today. Network attack and defense are two inseparable components of network war. If we want to achieve the succession of attack and defense, we must know the protocol that support the network's run. The future network is abundance of mobile equipment, it is bound to use IPv6 and Mobile IPv6 (MIPv6) protocol. As we know, many nations have instituted material plan for the using of MIPv6. If we want to hold predominance in tomorrow's information war, we must care about MIPv6's run and relatively security problem.In this article, the author focus on the MIPv6's run and security. At first, it's the basically introduction of IPv6 and MIPv6. Simulated the simple run of Mobile IP, and analyzed the result. After that, the author make some discussion to MIPv6's security problem and cryptography system. Based on those knowledges, the author point out the sticking point of MIPv6's seurity problem. Then, it's the introduction of two security mechanisms that heve been developed to protect MIPv6 today. At last, the author analyzed the Return Routability (RR) mechanism, and point out it can lead to man-in-middle attack . To surmount this attack, the author presented a security strengthened RR mechanism.The research cont of the article as follows:1. Because MIPv6 is based on IPv6, the author discussed the mainly content of IPv6 at first. Point out that the main security problem of MIPv6 is how a mobile node can prove he has the proprietary of the Care-of Address and the Home Address he declared and how to protect Bingding Update (BU) message.2. Simulated the run of MIPv6 by NS, and gave some analysis. Based on the simulator result, we can see it proved the theory: if the network that the MN located has changed, the CoA that the MN hold will also be changed.3. Instituted the material resolves to the messages that used in MIPv6, especially the BU. Analyzed MIPv6's two protection mechanism that had been bring forwarded.4. Analyzed the Return Routability (RR) mechanism, and point out it can lead to man-in-middle attack . To surmount the attack, the author presented a security strengthened RR mechanism, and analyzed it's security at last.
Keywords/Search Tags:IPv6, MIPv6, security, CoA, HoA, Binding Update, NS simulator, Return Routability
PDF Full Text Request
Related items