Secure Mobile IP Communication: Marc Danzeisen and Prof. Dr. Torsten Braun
Secure Mobile IP Communication: Marc Danzeisen and Prof. Dr. Torsten Braun
Secure Mobile IP Communication: Marc Danzeisen and Prof. Dr. Torsten Braun
Marc Danzeisen
and
Prof. Dr. Torsten Braun
Institute of Computer Science and Applied
Mathematics, University of Bern
Presented By,
Vinod Mehta
Introduction
• Describes a solution called Secure Mobile IP (SecMIP)
to provide mobile IP users secure access to their
company's firewall protected virtual private network.
• The solution requires neither introducing new protocols
nor to insert or modify network components. It only
requires a slight adaptation of the end system
communication software.
• The paper describes the concept, prototype
implementation, and initial performance measurement
results.
Overview of Mobile IP
• Mobile Node (MN): A host or router, which can change its point of
attachment from one network or sub network to another. This
change of location may not concern its (home) IP address. All
ongoing communications can be maintained without any interrupt.
• Home Agent (HA): A router on the mobile node’s home network that
redirects any IP packets for the mobile node to its current location.
• Foreign Agent (FA): A router on a visited network providing routing
services to the MN.
• Correspondent Node (CN): A host or a router with which MN wants
to communicate.
Mobile IP Functionalities
• Agent Discovery
• Registration
• Tunneling
Agent Discovery and Registration
FA Decapsulation
MN Decapsulation
Triangle Routing
• Transport
• Tunnel
Encapsulating Security Payload
Components
• Security Association
Based on the rules of that SA, decide how to decrypt and
authenticate the received data.
• SecMIP uses an IPSec tunnel to protect the Mobile IP tunnel passing the insecure
parts of the Internet. Within the private network, however, the Mobile IP tunnel is
sufficient.
Sec Mobile IP Operation
1. Network Detection
2. Acquiring a routable IP address
3. Establishment of a bi-directional IPSec tunnel between
MN and Home Firewall
4. Home Agent and MN negotiation: Mobile IP
registration (light)
5. Data transfer from the MN to the whole Internet
including its home network
Network Detection
Acquiring a routable IP address
Bi-directional IPSec tunnel
Registration and Data Transfer
Registration: Since Everything pass through IPSec tunnel, no need for
authenticating or encrypting registration messages.
If mobile node changes its location, the whole process begins with step 1.
Messages Exchanged
Security Aspects using SecMIP
• Denial of Service
• Replay Attack
• Eavesdropping
• Session-stealing Attacks
Experimental Results
Test Scenarios
• Routing Through the network
• Using Mobile IP tunneling
• Using SecMIP
Tested with Packets of sizes 64bytes and
1400bytes
Network Performance
Mobile IP
SecMIP
Conclusion
• All these tests have been made to see which processes
have which impact on the performance. Having a closer
look at the results leads to the conclusion that security
has its price. The deployment of IPSec realized as a
software module has to be paid with up to 80% of
performance impact.