datatracker.ietf.org
Sign in
Version 5.7.1.p2, 2014-10-29
Report a bug

Mobile IPv6 Location Privacy Solutions
RFC 5726

Internet Research Task Force (IRTF)                               Y. Qiu
Request for Comments: 5726               Institute for Infocomm Research
Category: Experimental                                      F. Zhao, Ed.
ISSN: 2070-1721                                                   Google
                                                               R. Koodli
                                                           Cisco Systems
                                                           February 2010

                 Mobile IPv6 Location Privacy Solutions

Abstract

   Mobile IPv6 (RFC 3775) enables a mobile node to remain reachable
   while it roams on the Internet.  However, the location and movement
   of the mobile node can be revealed by the IP addresses used in
   signaling or data packets.  In this document, we consider the Mobile
   IPv6 location privacy problem described in RFC 4882, and propose
   efficient and secure techniques to protect location privacy of the
   mobile node.  This document is a product of the IP Mobility
   Optimizations (MobOpts) Research Group.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for examination, experimental implementation, and
   evaluation.

   This document defines an Experimental Protocol for the Internet
   community.  This document is a product of the Internet Research Task
   Force (IRTF).  The IRTF publishes the results of Internet-related
   research and development activities.  These results might not be
   suitable for deployment.  This RFC represents the consensus of the IP
   Mobility Optimizations Research Group of the Internet Research Task
   Force (IRTF).  Documents approved for publication by the IRSG are not
   a candidate for any level of Internet Standard; see Section 2 of RFC
   5741.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   http://www.rfc-editor.org/info/rfc5726.

Qiu, et al.                   Experimental                      [Page 1]
RFC 5726             MIP6 Location Privacy Solutions       February 2010

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

Qiu, et al.                   Experimental                      [Page 2]
RFC 5726             MIP6 Location Privacy Solutions       February 2010

Table of Contents

   1. Introduction ....................................................5
   2. Conventions and Terminology .....................................6
      2.1. Conventions ................................................6
      2.2. Terminology ................................................6
   3. Requirements ....................................................8
   4. Solution Overview ...............................................9
   5. Reverse-Tunneled Correspondent Binding Update ..................11
      5.1. The Procedure .............................................12
      5.2. Route-Optimized Payload Packets ...........................14
      5.3. Mobile Node Operation .....................................15
           5.3.1. Conceptual Data Structures .........................15
           5.3.2. Reverse-Tunneled Correspondent Binding
                  Update to the Correspondent Node ...................15
           5.3.3. Reverse-Tunneled Correspondent Binding
                  Acknowledgement from the Correspondent Node ........16
           5.3.4. Route-Optimized Payload Packets ....................16
           5.3.5. Receiving ICMP Error Message .......................17
           5.3.6. Binding Error from the Correspondent Node ..........17
           5.3.7. Binding Refresh Request from the
                  Correspondent Node .................................17
      5.4. Home Agent Operation ......................................17
      5.5. Correspondent Node Operation ..............................18
           5.5.1. Conceptual Data Structures .........................18
           5.5.2. Reverse-Tunneled Correspondent Binding
                  Update from the Mobile Node ........................18
           5.5.3. Reverse-tunneled Correspondent Binding
                  Acknowledgement to the Mobile Node .................18
           5.5.4. Route-Optimized Payload Packets ....................18
           5.5.5. ICMP Error Message to the Mobile Node ..............19

[include full document text]