Improvement on Security and Performance of MIP6 Return Routability Test
draft-zhao-mobopts-rr-ext-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Fan Zhao | ||
Last updated | 2005-07-14 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
In this draft, we propose several extensions to improve the security and performance of MIP6 Return Routability test. Our proposal enables CN and MN to promptly and reliably detect the on-path attack and reduce the signaling overhead in a secure, efficient and back- compatible way. The core idea is to use hash chain to replace home test procedure in some circumstances and we carefully integrate hash chain into original MIP6 RR test without introducing new vulnerabilities. Although it does slightly increase the management cost of CN, we show that the extended RR test is more secure and more efficient than other approaches.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)