IEEE 802.11 기반의 고속의 안전한 Mobile IPv6 핸드오프 메커니즘

Fast and Secure Handoff Mechanism for Mobile IPv6 based on IEEE 802.11

  • 강현선 (단국대학교 정보기술연구소) ;
  • 박창섭 (단국대학교 전자컴퓨터학부)
  • 투고 : 2009.08.06
  • 심사 : 2009.10.27
  • 발행 : 2010.02.28

초록

802.11 기반의 환경에서 원활한 실시간 멀티미디어 서비스를 위해서는 신속하고 안전한 핸드오버가 반드시 제공되어야 한다. 본 논문에서는 802.11 WLAN 환경에서 L2 계층과 L3 계층을 통합한 FMIPv6 핸드오프 프로토콜을 제안한다. 해당 프로토콜에서는 핸드오버 메시지 보호를 위해 계층적 키 관리 기법 및 인증 메커니즘을 제안한다. 신속한 핸드오버를 위해서는 AAA와의 접속을 최소화한다. 또한 제안 프로토콜의 핸드오버 비용을 기존연구와 비교, 분석해 본다.

It is necessary to provide a fast and secure handover for seamless real-time multimedia services based on IEEE 802.11. In this paper, we propose FMIPv6 handoff protocol integrating L2/L3 layer based on IEEE 802.11 WLAN environment. In that, we propose a hierarchical key management scheme and authentication mechanism for protecting the handover signaling messages. The number of connections with AAA server is minimized for the fast handover. It is also compared and analyzed the handover cost with previous method.

키워드

참고문헌

  1. IEEE Std 802.11f, IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation. 2003.
  2. IEEE Std 802.11i, IEEE Standard for Wireless LAN Medium Access Control and Physical Layer Specifications (Amendment 6: Medium Access Control Security Enhancements), 2004
  3. R. Koodli, "Fast Handovers for Mobile IPv6," RFC 4068, 2005.
  4. J. Xie and I. Shibeika, "IEEE 802.11-based Mobile lP Fast Handoff Latency Analysis," Proc. of IEEE ICC 2007, Dec. 2007.
  5. S. Mohanty and I. F. Akyildiz, "A cross-layer handoff management protocol for next generation wireless systems," IEEE Trans. Mobile Computing, Vol.5, No. 10, pp. 1347-1360, Oc. 2006. https://doi.org/10.1109/TMC.2006.142
  6. D. Su and S.-J. Yoo, "Fast handover failure-case analysis in hierarchical Mobile IPv6 networks," IEICE Trans. Communications, Vol.E89-B, No.6, pp.1892-1895, June 2006. https://doi.org/10.1093/ietcom/e89-b.6.1892
  7. A Mishra, M.H. Shin, N.L. Petroni Jr., T.C. Clancy, and W.A Arbaugh, "Proactive Key Distribution Using Neighbor Graphs," IEEE Wireless Comm, Vol.11, No.1, pp. 26-36, Feb. 2004. https://doi.org/10.1109/MWC.2004.1269714
  8. S. Pack and Y. Choi, "Fast Inter-AP Handoff using Predictive-Authentication Scheme in a Public Wireless LAN," IEEE Networks, pp. 15-26, Aug. 2002.
  9. A.Mishra M. Shin and W. Arbaugh, "Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network," IEEE INFOCOM conference, Hong Kong, Mar. 2004.
  10. S. Pack and Y. Choi, "Pre-Authenticated Fast Handoff in a Public Wireless LAN based on IEEE 802.1x Model," IFIP TC6 Personal Wireless Communications, pp. 175-182, Oct. 2002.
  11. J. Kempf and R. Koodli, "Bootstrapping a Symmetric IPv6 Handover Key from SEND," draft-kempf-mobopts - handover-key-01, 2005.
  12. H.S. Kang and C.S. Park, "MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks," CISC, Lecture Notes in Computer Science, vol.3822 of LNCS, Springer-Verlag, pp. 407-418, 2005.
  13. H. Wassim and K. Suresh, "Combining Cryptographically Generated Address and Crypto- Based Identifiers to Secure HMIPv6," lnternet Draft, draft-haddad-mipshop-hmipv6-security-06, 2006.
  14. Arkko, J., Devarapalli, V. and F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents," RFC 3776, June 2004.
  15. G. O'Shea and M. Roe, "Child-proof Authentication for MIPv6," ACM Computer Communications Review, 31 (2), pp. 4-8, July 2001. https://doi.org/10.1145/505666.505668
  16. V. Narayanan, "Handover Keys Using AAA," drajt-vidya-mipshop-handover-keys-aaa-01, 2005.
  17. S. Jung, "Access Authentication Protocol in FMIP6," draft-mipshop-access-auth-00, 2006.
  18. M. Nakhjiril, "A Keying hierarchy for managing Wireless Handover security," draft-nakhjiri-hokey-hierachy-01, 2006.
  19. T. Charles "Secure Handover in Enterprise WLANs:CAPWAP, HOKEY, and IEEE 802.11r," IEEE Wireless Communication, pp. 80-85. Oct. 2008.
  20. P. Nickander, "lPv6 Neighbor Discovery Trust Models and Threats," RFC 3756, 2004.
  21. P. McCann, "Mobile IPv6 Fast Handovers for 802.11 Networks," RFC 4260, 2005.
  22. Ian F., Akyildiz, Joseph, S.H "Mobile user location update and paging under delay constraints," ACM-Baltzer J. Wireless Networks, Vol.1, pp. 413-425, Dec. 1995. https://doi.org/10.1007/BF01985754
  23. Yi-Bing, Lin "Reducing location update cost in a PCS network," IEEE/ACM Trans. Networking, Vol.5, pp. 25-33, Feb. 1997. https://doi.org/10.1109/90.554719
  24. Ian F., Akyildiz, Wenye, W. "A dynamic location management scheme for next-generation multitier PCS systems," IEEE Trans. Wireless Commu, Vol.1, No.1, pp. 178-189, Jan. 2002. https://doi.org/10.1109/7693.975456
  25. Sangheon, P., Yanghee, C. "A study on performance of hierarchical mobile IPv6 in IP-based cellular networks," IEICE Tran. Commun., Vol.E87-B, No.3, pp. 462-469, Mar. 2004.
  26. Antoon, B., Ren, G., Joos, V. "Fast hashing on the Pentium," In N. Koblitz, editor, Advances III cryptology, Proceedings Crypto'96, Springer. Vol.1109, pp. 298-312. 1996.