Font Size: a A A

Research On The Security Of The Mobile IPv6

Posted on:2008-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZouFull Text:PDF
GTID:2178360212479764Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In the 1990s, the information industry which is represented for internet and mobile correspondence developes fastly, and goes on adjustment and upgrade. Now the internet based IPv4 protocol is transiting into the internet based IPv6 protocol, the mobile correspondence technology also evolves from 2nd and 2.5nd generation to 3rd generation. The fast development and unition bring up a new thing──next generation mobile internet, one of the key technologies that carry out the next generation mobile internet is the mobile IPv6 protocol, so the mobile IPv6 protocol holds the balance of the information technology development in the future.At present, the IPv6 technology is in the period of the maturity, but the internet based the IPv6 protocol has not come to popularization for some reasons, the mobile IPv6 technology is also on the surface of the theory for some key technologies have not settled, such as hand off technology,QoS,multicast technology and security and so forth, especially the security needs to be settled urgently.In the paper, the security issues of the mobile IPv6 are researched mainly, the main research contributions are the following:(1) Aiming to security threats in the mobile IPv6 and lack of identity authentication mechanism, a hierarchical certificate mechanism is suggested. The new mechanism is based on the IPv6 aggregatable global unicast address format, through the management system of the higher and lower lever, it deployes the hierachical certificate on the hierachical entities. Each of the hierachical entities can get a certificate when the IPv6 address is distributed, the mechanism is feasible and used for the identity authentication of entities in the mobile correspondence.(2) Based on the hierachical certificate mechanism, a mobile IPv6 binding update protocol is suggested. By pre-sending binding update request, the correspondence time of negotiation is shorter, by binding several care-of addresses each one and adjusting the key length as the secret degree of the message, the efficiency of the protocol is improved. The security is also improved when introducing the identity authentication mechanism.
Keywords/Search Tags:Hierarchical, Binding Update, Mobile IPv6, Security
PDF Full Text Request
Related items