Security in MobileIP, F.A. Saeed
Download
Report
Transcript Security in MobileIP, F.A. Saeed
Security in MobileIP
Fahd Ahmad Saeed
Wireless Domain Problem
Wireless domain insecure
Data gets broadcasted to everyone, and
anyone hearing this can read it, regardless
of destination address.
Common Security Problem
Denial of Service
Replay Attacks
Theft of Information by Passive
Eavesdropping
Session Hijacking
Malicious Mobile Node Flooding
Other Active Attacks
Dos Attack at MobileIP
If the bad guy manages to get a bogus registration of a new
care-of-address for a certain mobile node, the Dos attack can
occur and can cause these problems:
•The actual mobile node is no longer connected.
•The bad buy can see all the traffic going to the actual
mobile node.
Replay Attacks
A malicious node obtains a valid
Registration Request, stores it, and then
replay it to accomplish a forged care-ofaddress for a mobile node.
Two ways for protecting from this kind of
attack.
Timestamp
Nonce value
Theft of Information by Passive
Eavesdropping
Bad guy somehow manages to listen to the
traffic between the Mobile node and home
agent. The traffic can be accessed in two ways:
Physical access to the network and connect as host.
Receive packets that are transmitted wirelessly.
Solution:
Encryption
End to End Encryption
Link Layer encryption
Session-Hijacking
•Active form of Information theft.
•Solution:
•End to End Encryption
•Link Layer encryption
Malicious Mobile Node Flooding
•Insider attack: valid mobile node of the network
Other Active Attacks
Do not require that a mobile IP session should
be going on.
If physical access of the network is available, the
following attacks could happen:
Attacker can figure out the network prefix to use for
listening the Mobile IP agent advertisement or doing a
DHCP configuration request
Can guess an available host number to use
If attacker succeeded in guessing the available host
number, then the attacker can gain access to the IP
hosts.
Other Attacks
Solutions:
The entire visiting node must be registered to
the foreign agent. The foreign agent will not
route any packet for the mobile node that is
not being registered with the foreign agent.
Each mobile node trying to connect to the
foreign agent must perform link layer
encryption.
Conclusion
The Mobile Node and the Home Agent
share the same security association and
use the message digest 5 (MD5) with 128bit encryption.
Replay attacks are prevented by MN and
HA using shared random number. During
registration, the HA verifies the random
number and issues a new random number
for use for the next registration