A Secure Mobile IP Authentication based on Identification Protocol Authors: Doo Ho Choi, Hyungon Kim and Kyoil Jung Source: International Symposium on.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Secure Mobile IP Communication
Mobile Networking through Mobile IP
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Fast and Secure Universal Roaming Service for Mobile Internet Yeali S. Sun, Yu-Chun Pan, Meng-Chang Chen.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
An Improvement on Authenticated Key Agreement Scheme Authors: Chin-Chen Chang and Shih-Yi Lin Source: 2007 International Conference on Intelligent Pervasive.
Computer Security Key Management
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm IEEE Communications Letters, March 2004 Lein Harn, Manish Metha and Wen- Jung.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6 draft-qiu-mip6-hiding-movement-00.txt F. BAO, R. DENG, J. Kempf, Y. QIU and J.Y ZHOU.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Mobile IP Seamless connectivity for mobile computers.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
1 Mohamed M Khalil Mobile IPv4 & Mobile IPv6. 2 Mohamed M Khalil Mobile IP- Why ? IP based Network Sub-network A Sub-network B Mobile workforce carry.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings.
Chapter 21 Distributed System Security Copyright © 2008.
1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
Introduction to Mobile IPv6
MOBILITY Beyond Third Generation Cellular Feb
Wireless Authentication Using Remote Passwords Authors: Andrew Harding, Timothy W. van der Horst, and Kent E. Seamons Source: Proceedings of the first.
Spring 2004 Mobile IP School of Electronics and Information Kyung Hee University Choong Seon HONG
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
A Scheme for MN-MAP Security in HMIPv6 draft-qiu-mipshop-mn-map-security-00.txt Jianying ZHOU Feng BAO, Robert DENG, Ying QIU Institute for Infocomm Research,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
A Novel Cryptography for Ad Hoc Network Security ► Pi Jian-yong; Liu Xin-song; Wu Ai; Liu Dan; ► 2006 International Conference on Communications, Circuits.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Mobile IP Aamir Sohail NGN MS(TN) IQRA UNIVERSITY ISLAMABAD.
MIPv4-Diameter Update Tom Hiller Lucent Technologies.
Introduction Wireless devices offering IP connectivity
for IP Mobility Protocols
Mobile IP Regional Registration
Security Activities in IETF in support of Mobile IP
Chapter 24 Mobile IP.
Presentation transcript:

A Secure Mobile IP Authentication based on Identification Protocol Authors: Doo Ho Choi, Hyungon Kim and Kyoil Jung Source: International Symposium on Intelligent Signal Processing and Communication Systems 2004 (Proceedings of ISPACS Nov. 2004) Page(s): Presenter: Jung-wen Lo( 駱榮問 ) Date: 2005/12/22

2 Introduction Mobile IP MN: Mobile Node HA: Home Agent FA: Foreign Agent  Vulnerable to replay attack => FA authenticates the identity of HA or MN in the registration process Identification Protocol A cryptography protocol which is designed to allow one party to gain assurances that the identity of another is as declared Correspondent node Mobile node

3 Short term (One-time password) Long-term 0. secret key k Identification Protocol using One- way function ProverVerifier AliceBob 0. Secret key k; 正整數 t Public key pk=f t (k) 1. i 2. w i =f i (k) 3. f t-i (w i )?=pk TTP 1. i 2. w i =f i (h(k,N)),N 5. f t-i (w i )?=pk Nonce N 3. N 4. pk=f t (h(k,N))

4 Mobile IP Registration Protocol MNFA HA 0. N HA 1. M 1, K 3. M 2, K 2. M 1, K M 1 ={RRQ, N MN, N HA } Verify N HA, K M 2 ={RRP,N MN,N’ HA } 4. M 2, K M: Message RRQ: MIP Registration Request RRP: MIP Registration Reply K: Mac value of Msg under key K K: shared secret key between MN and HA N: Nonce ※ Problem: *Replay attack - 1 & 3 *Man-in-the-middle attack - FA

5 Mobile IP Authentication Protocol based on Identification Protocol MN FA HA Adv,i 1. M 1,s, K,I i MN 3. M 2,j, K,I j MN I i MN =f i (h(K,N HA )) random 0<s<t M 1 ={RRQ, N MN, N HA } Verify N HA, K 4. M 2,j, K Random 0<i<t Agent Advertisement 0. N HA Validate R FA f t-i (I i MN )?=pk I s FA =f s (h(K FA,N HA )) random 0<j<t, j≠i 2. M 1,s, K,j,I s FA CA pk=f t (h(K,N HA )) N HA f t-s (I s FA )?=pk FA I j MN =f j (h(K,N HA ) M 2 ={RRP,N MN,N’ HA } pk FA =f t (h(K FA,N HA )) f j-i (I i MN )?=I j MN or f i-j (I j MN )?=I i MN Mobile IP Authentication pk=f t (h(K,N’ HA ))

6 MN cannot authenticate FA HA should record nonce Comments MNFA HA 0. N HA, E(N HA ) 1. M 1,s, K,I i MN,E(N HA ) 2. M 1,s, K,j,I s FA, E(N HA ) MN FA CA 1.M 1,s, K,I i MN,N I s =f s (h(K FA,N)) N f t-s (I s )?=I t I t =f t (h(K FA,N))