Mobile IPv6 Security

  title={Mobile IPv6 Security},
  author={Tuomas Aura},
  booktitle={Security Protocols Workshop},
This paper presents a case study of security protocol design : authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protoco l design. The goal is to solve any new security issues caused by the introductio n of mobility without requiring any new security infrastructure. 
Highly Cited
This paper has 49 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 18 extracted citations

A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)

Computer Communications • 2008
View 14 Excerpts
Highly Influenced

Insider Attacks Study Against Mobile IPv6 Protocol

2008 4th International Conference on Wireless Communications, Networking and Mobile Computing • 2008
View 3 Excerpts
Highly Influenced

Binding Update Authentication Scheme for Mobile IPv6

Third International Symposium on Information Assurance and Security • 2007
View 4 Excerpts
Highly Influenced

Routing optimization security in mobile IPv6

Computer Networks • 2006
View 7 Excerpts
Highly Influenced

DoSing the road warriors of the next generation Internet for fun and profit

2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application • 2010
View 1 Excerpt

A New Secure Binding Management Protocol for Mobile IPv6 Networks

2008 The Fourth International Conference on Information Assurance and Security • 2008
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 12 references

An analysis of using reflectors for distribu ed denialofservice attacks

Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spaffold
ACM Computer Communications Review ( CCR ) • 2001

Authentication of Mobile IPv6 binding updates and acknowledgments. Internet Draft draft-roe-mobileipupdateauth-01.txt

Michael Roe, Tuomas Aura, Greg O’Shea, Jari Arkko
IETF Mobile IP Working Group, • 2001

Analysis of a Denial of Service Attack on TCP

IEEE Symposium on Security and Privacy • 1997