Secure Mobile IP Communication

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Security Issues In Mobile IP
Internet Protocol Security (IP Sec)
IPSec.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile Communications-Network Protocols/Mobile IP
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Mobile IP.
K. Salah1 Security Protocols in the Internet IPSec.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Mohamed M Khalil Mobile IPv4 & Mobile IPv6. 2 Mohamed M Khalil Mobile IP- Why ? IP based Network Sub-network A Sub-network B Mobile workforce carry.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Mobile IP Aamir Sohail NGN MS(TN) IQRA UNIVERSITY ISLAMABAD.
IP Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Introduction Wireless devices offering IP connectivity
Security Issues With Mobile IP
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Security Protocols in the Internet
Presentation transcript:

Secure Mobile IP Communication Marc Danzeisen and Prof. Dr. Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Presented By, Vinod Mehta

Introduction Describes a solution called Secure Mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither introducing new protocols nor to insert or modify network components. It only requires a slight adaptation of the end system communication software. The paper describes the concept, prototype implementation, and initial performance measurement results.

Overview of Mobile IP Mobile Node (MN): A host or router, which can change its point of attachment from one network or sub network to another. This change of location may not concern its (home) IP address. All ongoing communications can be maintained without any interrupt. Home Agent (HA): A router on the mobile node’s home network that redirects any IP packets for the mobile node to its current location. Foreign Agent (FA): A router on a visited network providing routing services to the MN. Correspondent Node (CN): A host or a router with which MN wants to communicate.

Mobile IP Functionalities Agent Discovery Registration Tunneling

Agent Discovery and Registration

FA Decapsulation MN Decapsulation

Triangle Routing Ingress Filtering could be a problem.

Reverse Tunneling Optimization can be achieved by directly FA routing the packets between MN and CN by building a tunnel with CN.

Optimized Routing Security will be a problem Have to inform all the CN of the MN’s COA– Not very feasible

Security issues in Mobile IP Eavesdropping: Where the attacker is simply “listening” at the communication with some IP packet sniffer software. Replay Attack: An attacker records and replays the registration sequence later. Denial of Service: An attacker overflows access server. This is possible because the sensitive IP addresses of the HA and the MN are not hidden in the registration messages. Tunnel Spoofing: The tunnel to the home network may be used to hide malicious IP packets and get them pass the firewall. Session Stealing: Attacker hi-jacks session just after registration.

Security Models Weak Security Approach Strong Security Approach HA has confidence that the care-of address of a MN is correct, because all allowed care-of addresses concern to well known IP address ranges in the campus network. Foreign Mobile IP compatible nodes (guests) in the network need to authenticate bindings. When a MN is migrating outside the protected campus network, it sends a registration request with password to the HA. Strong Security Approach Mobile IP authenticates any binding notification messages or other information received about a mobile host. Public and private keys and trusted servers are used, but in turn it slows down the operation

All these open issues make it hard to deploy Mobile IP in a company’s network environment that is used to transfer sensitive data. What is the solution to this? IPSec can solve nearly all of these security problems.

The Solution: IPSec What is IPsec? How does it work? What issues does it handle?

What is IPSec? It’s a method developed by IETF to secure IP layer. This protocol suite adds security services to the IP layer keeping compatible with IP standard. IPSec eases building secure virtual private networks (VPN) – a secure, private network that is as safe or safer than an isolated office LAN, but built on an unsecured, public network.

How it works? The Protocol The IPSec-Protocol-Suite consists of three main parts: • Authentication Header (AH) - ties data in each packet to a verifiable signature that allows to verify both the identity of the person sending data and that data has not been modified. • Encapsulating Security Payload (ESP) – encrypts data (and even certain sensitive IP addresses) in each packet – so a sniffer somewhere on the network doesn’t get anything usable. • Internet Key Exchange (IKE) – a powerful, flexible negotiation protocol that allows users to agree on authentication methods, encryption methods, the keys to use, how long to use the keys before changing them, and that allows smart, secure key exchange.

IPSec Modes Transport Tunnel

Encapsulating Security Payload Components Security Association Based on the rules of that SA, decide how to decrypt and authenticate the received data. SPI- Security Parameter Index Sequence Number

Authentication Header As its name says, it offers just authentication of data and not confidentiality. IPSec uses symmetric encryption scheme to encrypt the transported data. So now the only problem is to ensure a confidential exchange of this shared key among the communicating parties.

Internet Key Exchange IPSec group’s answer to protocol negotiation and key exchange through the Internet. Works in two phases : Phase 1 has 2 modes Main mode Aggressive mode Phase 2 has just 1 mode Quick Mode-accomplishes by negotiating an SA for general purpose communications.

Diffie- Hellman Scheme The keys are exchanged by Diffie Hellman scheme. Consider 2 parties A and B. Both select a large prime number P and a primitive g. These are not secret. A selects a large prime number x (x<P) and transmits to B X=g x mod P B selects a large prime number y (y<P) and transmits to A Y=g y mod P A calculates the remainder s =Y x mod P B calculates the remainder s’ =X y mod P Now s = s’ =g xy mod P No one else can come up with this value with just knowing X,Y,P,g They need to know either x or y since the value s or s’ depends on the private key which is secret.

Secure Mobile IP Scenario Demilitarized Zone (DMZ) MVPN

IPSec in Mobile IP As the mobile nodes that belong to the corporation have to traverse the firewall to access the VPN, they have to authenticate themselves to the firewall. This authentication is realized with IPSec. SecMIP uses an IPSec tunnel to protect the Mobile IP tunnel passing the insecure parts of the Internet. Within the private network, however, the Mobile IP tunnel is sufficient.

Sec Mobile IP Operation Network Detection Acquiring a routable IP address Establishment of a bi-directional IPSec tunnel between MN and Home Firewall Home Agent and MN negotiation: Mobile IP registration (light) Data transfer from the MN to the whole Internet including its home network

Network Detection

Acquiring a routable IP address

Bi-directional IPSec tunnel

Registration and Data Transfer Registration: Since Everything pass through IPSec tunnel, no need for authenticating or encrypting registration messages. Data Transfer: MN and CN begin communcation. If mobile node changes its location, the whole process begins with step 1.

Messages Exchanged

Security Aspects using SecMIP Denial of Service Replay Attack Eavesdropping Session-stealing Attacks

Experimental Results Test Scenarios Routing Through the network Using Mobile IP tunneling Using SecMIP Tested with Packets of sizes 64bytes and 1400bytes

Network Performance

Mobile IP

SecMIP

Conclusion All these tests have been made to see which processes have which impact on the performance. Having a closer look at the results leads to the conclusion that security has its price. The deployment of IPSec realized as a software module has to be paid with up to 80% of performance impact. Looking at the available bandwidth of today’s mobile networks as Wireless LAN, GPRS or even Bluetooth, the estimated performance of SecMIP is acceptable for the moment. Of course optimizations have to be considered to keep up with new technologies.