Fast Handover Security ~ (Cont.)

Download Report

Transcript Fast Handover Security ~ (Cont.)

Security on Fast Handover for
Proxy Mobile IPv6
2015. 6
Thunghai University
Assoc. Prof. Dr. Ilsun YOU
Korean Bible University
Table of Contents





Self Introduction
Summary of My Research Works
Research Plan
Research Collaborations
Q&A
1. Dr. Ilsun YOU
IET Fellow/ IEEE Senior Member
IFIP WG8.4 member
(http://ifip84.sba-research.org/)
Associate Professor
Dept. of Computer Software
Korea Bible University
* Joined department: March 2005

Education Background
◦ B.S., M.S, 1st Ph.D. from Dankook University
- Supervisor: Prof. Kyungsan CHO
◦ 2nd Ph.D. from Kyushu University, Japan
- Supervisor: Prof. Koichi SAKURAI
- supported by NRF-JSPS Ph.D. Dissertation Program

Work Experience (1997.3 ~ 2004.12: 7 years experience)
◦ Hanjo Engineering Co., Ltd. [GIS R&D]
◦ Internet Security Co., Ltd. [Internet Security R&D]
◦ THINmultimedia, Inc.[DRM Tech. R&D]
2. Summary of My Research Works

Research Interests & Outcomes
◦ Research topics





(Mobile) Internet and Wireless Network Security
Authentication and Access Control
Formal Security Analysis
Security & Cryptography API
Insider Threats and Information Leakage Prevention
◦ Publication – total 118 including finally accepted ones
(47: SCI(E), 2: Scopus, 14: KCI, 55: International Conference)
 ePASS: An expressive attribute-based signature scheme with privacy and an
unforgeability guarantee for the Internet of Things
 ACSP: A novel security protocol against counting attack for UHF RFID systems
 Enhancing MISP with Fast Mobile IPv6 Security
 DSSH: Digital signature based secure handover for network-based mobility
management
 Enhancing SVO Logic for Mobile IPv6 Security Protocols
2. Summary of My Research Works

Editorship
◦ Editor-in-Chief
 JoWUA (Scopus Indexed)
J. of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications
http://www.jowua.org
 JISIS
J. of Internet Services and Information Security
http://www.jisis.org/
 INPRA
It coNvergence PRActice
http://inpra.yolasite.com
◦ SCIE/Scopus Journal Editorial Board
 SCIE Journal
JNCA (IF: 1.467), IJAHUC (IF: 0.511), CAI (IF: 0.254)
 Scopus Journal: JHSN
2. Summary of My Research Works

Research events
◦ MobiWorld - Intl. Workshop on Mobility Management
in the Networks of the Future World
(with IEEE INFOCOM, GLOBECOM, CCNC conferences)
◦ MIST - Intl. Workshop on Managing Insider Security
Threats
◦ AsiaARES - The Asian Conf. on Availability, Reliability
and Security (with ICT-EurAsia conference)
◦ SeCIHD - IFIP Intl. Workshop on Security and Cognitive
Informatics for Homeland Defense (with ARES conference)
2. Summary of My Research Works

Research Projects
◦ Study on security for fast and seamless handover in PMIPv6 with
cross-layer approach based on IEEE 802.21 MIH
(NRF, 2014~16) – Principle Researcher
◦ Study on vulnerabilities of cryptographic software library
and their countermeasures (KISA, 2013)
(focusing on MS Crypto API Next Generation)
– Co-Researcher
◦ Development of a vulnerability analysis tool
for secure USB
(Prosecutor's Office, 2012) – Co-Researcher
◦ Vulnerability analysis on secure USB flash driver
(KIISC, 2012) – Co-Researcher
◦ Study on malware obfuscation technologies
(KISA, 2010) – Co-Researcher
2. Summary of My Research Works

Membership
Awarded as IET Fellow and IEEE Senior Member
2. Summary of My Research Works

“Security on Fast Handover for
the Mobile IPv6 Family”
◦ Organization of this talk




Mobility Management Overview
Mobile IPv6 Overview
Fast Handover Security for the MIPv6 family
My Research Plan
2. Summary of My Research Works
◦ Mobility Management
Mobility management has become an important
function which enables mobile nodes to successfully
receive new connections and maintain ongoing
connections during their movement
 Mobility management at different OSI layers :
 Link layer
treating movements between access points
 Network layer
treating movements between access routers (address changes)
 Upper layers
keeping the current Internet architecture. (ex. mSCTP (trans.), SIP (appl.))
 Cross-layer
taking advantages from different layers It is popular to combine network layer
with link layer.
2. Summary of My Research Works
◦ Mobility Management (Cont.)
2. Summary of My Research Works
◦ Mobility Management (Cont.)
2. Summary of My Research Works
◦ Mobility Management (Cont.)
In real world, there are two major mobile networks:
3GPP family and Mobile WiMAX (IEEE 802.16m)
 These networks just deploy link layer mobility while
intentionally excluding IP mobility :
 The Cost for IP mobility is expensive
 Most of applications are simple Web based applications and
their life time tends to be short. Thus, it is not so necessary to
maintain sessions during mobile nodes’ movements.
 Each IP subnet covers a large area (no address change)
For example, the subscribers of China Mobile access to the
Internet through the GPRS can use the same IP address in a
province (e.g. Guangzhou Province about 180,000 square
kilometers)
2. Summary of My Research Works
◦ Mobility Management (Cont.)
 Due to the 4G requirements,
IP mobility recently has gained attention:
 High speed: 100 mbps / 1 Gbps
 high qualified multimedia applications such as
VoIP, video conference, mobile online game, etc.
 It is necessary to maintain sessions during MNs’
movements
 Smooth handover between heterogeneous networks
(especially between 3GPP and non-3GPP networks)
 WLAN offload issue
 As a result, IP mobility has been included in:
 3GPP LTE/SAE: MIPv6, PMIPv6,
DMIPv6 (Dual-Stack MIPv6)
 Mobile WiMAX: MIPv4, MIPv6, PMIP4
2. Summary of My Research Works
◦ Mobile IPv6 Overview
Mobile IPv6 (MIPv6) is a protocol that enables nodes
to stay reachable regardless of their movements and
locations in the IPv6 Internet (IETF RFC 3775)
 During a handover procedure,
MN should perform the following steps:
 (Step 1) Movement Detection
 (Step 2) IP Address Configuration
 (Step 3) Binding Update

Unfortunately MIPv6 suffers from long latency
and high signaling overhead caused
in this procedure.
2. Summary of My Research Works
◦ Mobile IPv6 Overview (Cont.)
 MIPv6 Extensions :
 Fast handover for MIPv6 (FMIPv6) – Steps 1 & 2
by using link layer (L2) triggers and
bi-directional tunneling between access routers
 Hierarchical MIPv6 (HMIPv6) – Step 3
by using hierarchical mobility management with
a new entity called Mobility Anchor Point (MAP)
 Enhanced Route Optimization (ERO) – Step 3
by using CGA (public key based strong security scheme)
and early binding update
 Fast handover for Hierarchical MIPv6 (F-HMIPv6)
– Step 1~3
by combining FMIPv6 and HMIPv6
2. Summary of My Research Works
◦ Mobile IPv6 Overview (Cont.)
 Proxy MIPv6 (PMIPv6)
MIPv6 and its enhancements failed to
be widely deployed in real networks:
(Host Based Approach)
Mobile nodes are required to participate in mobility
management, thus having to implement this function in
themselves.  Legacy device cannot be supported!
 Proxy MIPv6 (PMIPv6) was developed by IETF as
a standard network-based mobility management
protocol (IETF RFC 5213, 2008).
 PMIPv6 introduces new network entities:
MAG and LMA, which treat MNs’ handovers
while making MNs free from mobility management
2. Summary of My Research Works
◦ Mobile IPv6 Overview (Cont.)
 Proxy MIPv6 (PMIPv6) (Cont.)
Similar to MIPv6, PMIPv6 suffers from
long handover latency.
 Fast Handovers for Proxy Mobile IPv6 (FPMIPv6)
and Context Transfer for Proxy Mobile IPv6
(CTPMIPv6) are introduced.
 FPMIPv6 was adopted as a standard
(IETF RFC 5949, 2010)
2. Summary of My Research Works
◦ Fast Handover Security for
the Mobile IPv6 Family
 Fast Handover Extensions
for the MIPv6 Family (F-MIP):
FMIPv6, F-HMIPv6, FPMIPv6
 Fast handover extensions for MIPv6 perform
handover procedure before MN moves to a new
network with the help of layer two triggers.
 Security is sacrificed for efficiency.
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Without being secured, the extensions are
critically vulnerable to various security threats:






Masquerading
Message tampering
Replay Attack
Denial of Service Attack
Session Hijacking Attack
Malicious Mobile Node Flooding Attack
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Requirements:
Authentication
Location Verification
Confidentiality
Integrity
Handover Key Independence
Compromise of a current handover key should not
result in compromise of its previous or subsequent ones
 Tight bind between
handover key and care-of address
Aims to prevent a malicious node from using its valid
handover key to occupy a victim’s care-of address
while masquerading the victim





2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Two Major Security Technologies
for Fast Handover Security:
 Authentication, Authorization, and Accounting
Infrastructure (AAA Infrastructure)
Providing mutual authentication and
secure key exchange
 Cryptographically Generated Address (CGA)
Allowing two previously unknown nodes
to authenticate each other
based on public key cryptography.
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Schemes for FMIPv6
 Kempf-Koodli's protocol (KKP)
- Security Standard for FMIPv6 (RFC 5269)
- CGA based structure
- Strong security but heavy computation overheads
 Haddad-Krishnan's protocol (HKP)
- a light weight approach to improve KKP
- Hash-chain based structure but CGA is needed
- Efficient and light weight but still security problems
 Narayanan et al.'s protocol (NEP)
- Based on the AAA infrastructure
- public key operations not needed
but suffers from AS’s involvement every handover
 My Contribution to FMIPv6 Security
 YOU-HORI-SAKURAI’s protocol (YSHP)
- Combining CGA and AAA to address
the high computation cost and the DoS attacks
which KKP suffers from
- Achieving both efficiency and security
Movement Detection
with L2 triggers
Fast Binding Update
Attachment
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Scheme for F-HMIPv6
F-HMIPv6 is known to provide
the best handover performance.
 Kang and Park's protocol (KPP)
- Protecting F-HMIPv6 based on the group key
- Not providing the key independency
due to being based on the group key
- Vulnerable to
the DoS, replay, and Malicious Mobile Node Flooding
attacks.
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 My Contribution to F-HMIPv6 security
 Enhanced security scheme for F-HMIPv6 (ESS-FH)
- Counting on the CGA method to solve
the main drawbacks of KPP
- Providing the handover key independence
- Defending against the attacks, which KPP suffers from:
DoS attack, replay attack, and
Malicious Mobile Node Flooding attack
- Providing the secure fast inter-handover
between different Mobility Anchor Point (MAP) domains.
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Schemes for FPMIPv6
- PMIPv6 and FPMIPv6 depend on the pure AAA system.
- Long handover latency is caused by
the full Extensible Authentication Protocol (EAP).
◦ Fast Handover Security ~ (Cont.)
 Security Schemes for FPMIPv6
- For example, EAP-AKA, which is widely adopted.
Full EAP-AKA: 2 long RTT + 1 RTT
REAUTH - EAP-AKA: 2 long RTT
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Schemes for FPMIPv6 (Cont.)
 ERP – IETF RFC 5296
(EAP Extensions for EAP Re-authentication Protocol)
- In the first access, a full EAP procedure is executed
resulting in a master key between MN and AAA AS.
The successive accesses are optimized based on
the master key helps
- Still one long RTT is needed between MN and AAA AS
 Ticket based Security Schemes
- Lee et al.’s protocol and Chuang et al.’s protocol
- They depend on the group key or the context transfer,
thus vulnerable to “Compromise of a single node“
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 Security Schemes for FPMIPv6 (Cont.)
 ERP – IETF RFC 5296
(EAP Extensions for EAP Re-authentication Protocol)
- In the first access, a full EAP procedure is executed
resulting in a master key between MN and AAA AS.
The successive accesses are optimized based on
the master key helps
- Still one long RTT is needed between MN and AAA AS
 Ticket based Security Schemes
- Lee et al.’s protocol and Chuang et al.’s protocol
- They depend on the group key or the context transfer,
thus vulnerable to “Compromise of a single node”
 The existing schemes are vulnerable to
the malicious insider attacks.
2. Summary of My Research Works
◦ Fast Handover Security ~ (Cont.)
 My contribution for FPMIPv6 Security
 DSSH (Digital signature based secure handover for
network-based mobility management)
- In the host-based MIPv6 family, it is assumed that
there is no global security infrastructure.
- Because PMIPv6 is a network based approach,
it is possible to deploy public key infrastructure.
- DSSH uses public key cryptography for protecting
FPMIPv6 as well as allowing MN to be directly
authenticated to its visiting network
- DSSH defends against malicious insiders.
3. Research Plan
◦ Future Works –
Security for fast and seamless handover in
PMIPv6 with cross-layer approach based on
IEEE 802.21 MIH
 1st phase:
Security Protocol for FPMIPv6 (SPFP)
 2nd phase:
Security for Cross-Layer Handover based on
IEEE 802.21 MIH
( focusing on IEEE 802.21a-2012)
 3rd phase:
Applying SPFP to 2 layer networks
4. Q&A
Thank you!