Network Mobility Yanos Saravanos Avanthi Koneru. Agenda Introduction Problem Definition Benchmarks and Metrics Components of a mobile architecture Summary.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
Secure Mobile IP Communication
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Research Seminar on Telecommunications Business IPSEC BUSINESS Henri Ossi.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
1 Mobile IP Myungchul Kim Tel:
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-kivinen-mobike-design-00.txt Tero Kivinen
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
Yanos Saravanos Avanthi Koneru
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Internet Protocol Security (IPSec)
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
7/14/2003IETF57 PANA enabling IPsec based Access control draft-mohanp-pana-ipsec-00.txt Mohan Parthasarathy Tahoe Networks - Presented by Hannes Tschofenig.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Network Mobility Yanos Saravanos Avanthi Koneru. Agenda Introduction Problem Definition Benchmarks and Metrics Components of a mobile architecture Summary.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
07/03/ nd IETF – Minneapolis Mobile IPv6 WG meeting PF_KEY Extension as an Interface between Mobile IPv6 and IPsec/IKE Shinta Sugimoto Francis Dupont.
An Introduction to Mobile IPv4
Network Mobility (NEMO) Advanced Internet 2004 Fall
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
Virtual Private Networks
Introduction Wireless devices offering IP connectivity
Virtual Private Networks
Introduction to Wireless Networking
Securing Access to Mobile Operator Core Networks using IKEv2
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Virtual Private Network zswu
Presentation transcript:

Network Mobility Yanos Saravanos Avanthi Koneru

Agenda Introduction Problem Definition Benchmarks and Metrics Components of a mobile architecture Summary of MOBIKE and PANA Conclusion References Avanthi Yanos

Why Mobility Matters Cell phones / PDAs  692 million cell phones shipped in 2004  1.7 billion subscribers by end of 2005  Streaming multimedia  Live TV

Real Mobility – Cellular Handoff Hard handoff  Connected to 1 base station at all times Soft handoff  Connected to 2 base stations temporarily

Handoff Hysteresis Only handoff when signal drops below a given threshold  Signal could be lower than optimal  Fewer handoffs

Upcoming Cellular Networks 4G cellular networks being developed  Uses ALL-IP network architecture  Ability to use base stations  Highly scalable Critical in emergency conditions

4G Network

Current Security Techniques HTTP-based schemes  Mobilestar Point-Point Protocol (PPP) using EAP 802.1X

Issues with Current Authentication HTTP-based schemes  Requires user intervention PPP  Requires point-to-point link  EAP requires extra encapsulation 802.1X  Only works for 802 protocols  Not widely deployment yet

Problem Definition All current security protocols do not allow end user to move New protocols must:  Keep session during handoffs  Allow integration between mobile networks (802.11, cellular, etc)  Not dramatically increase packet size

Benchmarks Computational intensity Effect on throughput  Amount of overhead added to the packets QoS  Packet Loss, Delay  Jitter

Elements of a mobile network architecture “Computer Networking: A top-down approach featuring the Internet”, Kurose and Ross, 3rd edition, Addison Wesley, 2004.

Elements of a mobile network architecture home network home agent foreign agent foreign address care-of address foreign (or visited) network correspondent permanent address

Indirect forwarding to a mobile node “Computer Networking: A top-down approach featuring the Internet”, Kurose and Ross, 3rd edition, Addison Wesley, 2004.

Encapsulation and Decapsulation “Computer Networking: A top-down approach featuring the Internet”, Kurose and Ross, 3rd edition, Addison Wesley, 2004.

Direct routing to a mobile user “Computer Networking: A top-down approach featuring the Internet”, Kurose and Ross, 3rd edition, Addison Wesley, 2004.

Security for Mobility on IP IP mobility introduces the need for extra security because the point of attachment is not fixed, so the link between the mobile node and its home network should be considered insecure. In all potential mobile-IP scenarios, security will be a critical service enabler, ensuring that the mobile operator can communicate over IP without putting at risk the confidentiality, integrity, or availability of the home network and the information it contains.

Mechanisms to be reviewed Protocol for carrying Authentication for Network Access (PANA) Mobility and Multihoming extension for IKEv2 (MOBIKE)

PANA - Protocol for carrying Authentication for Network Access a layer two agnostic network layer messaging protocol for authenticating IP hosts for network access a transport protocol for authentication payload (e.g., EAP) between a client (IP based) and a server (agent) in the access network. Client-server protocol

Why PANA? A scenario: An IP-based device is required to authenticate itself to the network prior to being authorized to use it. This authentication usually requires a protocol that can support various authentication methods, dynamic service provider selection, and roaming clients. In the absence of such an authentication protocol on most of the link- layers, architectures have resorted to filling the gap by using a number of inadequate methods. Ex: PPPoE PANA – a cleaner solution to the authentication problem.

Goals of PANA To define a protocol that allows clients to authenticate themselves to the access network using IP protocols. To provide support for various authentication methods, dynamic service provider selection, and roaming clients.

Terminology PANA Client (PaC) Device Identifier (DI) PANA Authentication Agent (PAA) Enforcement Point (EP)

Protocol Overview Discovery and handshake phase Authentication and authorization phase Access phase Re-authentication phase Termination phase

PANA MOBIKE PANA will enable the establishment of an IPsec SA between the PaC and the EP (a router) to enable access control. The WG will also working on how such an IPsec SA is established by using IKE after successful PANA authentication.

MOBIKE - Background IPSec SA = AH + ESP + IKE Authentication / Integrity Encrypted New IP Header ESP Original IP Header Authentication / Integrity New IP Header AH Original IP Header ESPAH

Main Scenario  Mobike  The main scenario is making it possible for a VPN user to move from one address to another without re- establishing all security associations, or to use multiple interfaces simultaneously, such as where WLAN and GPRS are used simultaneously.

Establishing a Secure Negotiation Channel using IKEv2 Figure from Dr. Andreas Steffen, Secure Network Communication, Part IV, IP Security (IPsec).

Problem Currently, it is not possible to change these addresses after the IKE_SA has been created. Scenario 1: A host changes its point of network attachment, and receives a new IP address. Scenario 2: A multihoming host that would like to change to a different interface if, for instance, the currently used interface stops working for some reason.

Solution The problem can be solved by creating new IKE and IPsec SAs. Not optimal since, in some cases, creating a new IKE_SA may require user interaction for authentication (manually entering a code from a token card). Creating new SAs often also involves expensive calculations and possibly a large number of roundtrips.

MOBIKE Solution The party that initiated the IKE_SA (the "client" in remote access VPN scenario) is responsible for deciding which address pair is used for the IPsec SAs, and collecting the information it needs to make this decision. The other party (the "gateway" in remote access VPN scenario) simply tells the initiator what addresses it has, but does not update the IPsec SAs until it receives a message from the initiator to do so.

Goals of the MOBIKE working group IKEv2 mobile IP support for IKE SAs. Support for changing and authenticating the IKE SA endpoints IP addresses as requested by the host. Updating IPsec SA gateway addresses. Support for changing the IP address associated to the tunnel mode IPsec SAs already in place, so that further traffic is sent to the new gateway address. Multihoming support for IKEv2. Support for multiple IP addresses for IKEv2 SAs, and IPsec SAs created by the IKEv2. This should also include support for the multiple IP address for SCTP transport. This should also work together with the first two items, i.e those addresses should be able to be updated too.

Goals of the MOBIKE working group (..cntd) Verification of changed or added IP addresses. Provide way to verify IP address either using static information, information from certificates, or through the use of a return routability mechanism. Reduction of header overhead involved with mobility-related tunnels. This is a performance requirement in wireless environments. Specification of PFKEY extensions to support the IPsec SA movements and tunnel overhead reduction.

Conclusion Utilizing the benefits of the opportunities provided by default in IPv6 for the design of Mobile IP support in IPv6. Besides, these two protocols there are a lot of other security issues. Focus on mechanisms which will be adopted in the design of IPv6.

References “Security requirements for the introduction of mobility to IP”, Security for mobility in IP, EURESCOM, October URL: series/P912/D1/p912d1.pdfhttp:// series/P912/D1/p912d1.pdf “Security guidelines for the introduction of mobility to IP”, Security for mobility in IP, EURESCOM, March URL: deliverables/P900-series/P912/D2/p912d2.pdfhttp:// deliverables/P900-series/P912/D2/p912d2.pdf Olivier Charles, “Security for Mobility on IP”, MTM 2000, Dublin, February URL: seminars/2000/MTM/12Charles/12aCharles/12Charles.pdfhttp:// seminars/2000/MTM/12Charles/12aCharles/12Charles.pdf SEQUI VPN Glossary, URL: “Computer Networking: A top-down approach featuring the Internet”, Kurose and Ross, 3rd edition, Addison Wesley, 2004.

References Mobility for IPv4 (mip4), IETF Working Groups. URL: Mobility for IPv6 (mip6), IETF Working Groups. URL: D.Johnson, C. Perkins and J.Arkko, “Mobility Support in IPv6”, RFC URL: Arkko et al, “Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents”, RFC URL: IKEv2 Mobility and Multihoming (mobike), IETF Working Groups. URL:

References Jari Arkko, “Introduction to multihoming, address selection, failure detection, and recovery”, IETF Proceedings. URL: 1/sld1.htmhttp://www1.ietf.org/proceedings_new/04nov/slides/mobike- 1/sld1.htm “Design of the MOBIKE protocol”, Internet Draft, draft-ietf-mobike- design-00.txt, June URL: design-00.txthttp://www1.ietf.org/proceedings_new/04nov/IDs/draft-ietf-mobike- design-00.txt Internet Key Exchange (IKEv2) Protocol, Internet Draft, draft-ietf-ipsec- ikev2-17.txt, September URL: drafts/draft-ietf-ipsec-ikev2-17.txthttp:// drafts/draft-ietf-ipsec-ikev2-17.txt IKEv2 Mobility and Multihoming Protocol (MOBIKE), Internet Draft, draft-ietf-mobike-protocol-02.txt, September URL: