CN. New IPv6 addresses may of course be
dynamically configured by the attacking Eves during
the attack.
To minimize the effect of different known and
unknown attacks, the designers of the RR protocol
introduced a 420 seconds durability of the mapping
from a MN’s HoA address to the MN’s CoA
address. If not updated, MN’s entry in CN’s BC is
deleted. In addition to making different attacks more
complicated, the deletion of BC entries is used as
memory management. A CN may delete entries
from its BC when not in use.
Due to the removal of BC entries, even an honest
MN must initiate the RR procedure and send new
BU messages to its CNs at least every 420 seconds.
This feature was also used in the design of our ROM
protocol. Attackers must now execute their BC
flooding attacks within a 420 seconds time interval.
4.2 BC flooding attack on the RR
protocol II
IPv6 will continue to use the model from IPv4
(Hinden, 2003); a subnet prefix is associated with
one link and multiple subnet prefixes may be
assigned to the same link, e.g. an Ethernet. This will
ease our flooding attack, reducing the need of two
cooperating Eves to launch the attack, to only one
Eve. If the subnet where an Eve is located is
assigned multiple subnet prefixes, Eve may act as
both Eve_1 and Eve_2. Eve may now configure lots
of IPv6 addresses using two different subnet
prefixes. Eve may then by herself launch the attack
of Section 4.1. Of course Eve may have to be a more
powerful node in this attack scenario than in the
scenario of Section 4.1.
Since every node in MIPv6 may become a CN of
a MN, and the MIPv6 protocol is supposed to be a
default part of the IPv6 protocol, any IPv6 node may
be victim to this BC flooding attack. However,
attacking a node that is often used as a CN by other
MNs, will be more harmful than attacking a node
that is never used, and hence not in need of its BC.
5 CONCLUSION
Return Routability (RR) is the route optimization
protocol suggested by the IETF (Johnson, 2004). RR
is used to authenticate binding updates sent from
mobile nodes (MNs) to corresponding nodes (CNs).
Our ROM protocol (Veigner, 2004) intends to make
MIPv6 route optimization more seamless than RR
manage; in other words, to speed up the procedure
and at the same time provide similar security
characteristics. The importance of the protocol being
seamless is the fact that route optimizations are often
carried out during a MN’s handover from one subnet
to another.
This paper focuses on flooding attacks on the
binding cache (BC) at CNs, and shows to which
extent the RR protocol as well as our ROM protocol
is vulnerable to such attacks.
Certain countermeasures have been suggested.
The 420 seconds durability of BC entries is already
included in both protocols. Nevertheless, the BC
flooding attack discovered on the IETF suggested
RR protocol is important to point out. Another
countermeasure is to keep the number of entries
allowed in a BC low. This is not necessarily a good
solution, making DoS attacks easier to carry out by
means of BC flooding attacks. Strong authentication
was also considered, but the solution has a major
disadvantage in scalability due to the lack of a global
PKI. Use of asymmetric cryptography would also be
a very CPU-consuming feature; resulting in
increased DoS attack vulnerabilities.
As we all know, bandwidth in mobile and
wireless networks is unpredictable and often low. In
comparison to RR, the main benefit of the ROM
protocol is the reduction of messaging when re-
establishing route optimization from a new subnet.
It is important that we understand all the threats
the new technology creates before a possible
deployment.
REFERENCES
Aura, T., 2002. Mobile IPv6 Security, Cambridge Security
Protocols Workshop.
Deng, R. H., Zhou, J., Bao, F., 2002. Defending Against
Redirect Attacks in Mobile IP, Proceedings of the 9th
ACM conference on Computer and communications
security.
Hinden, R., Deering, S., 2003. Internet Protocol Version 6
(IPv6) Addressing Architecture, IETF RFC 3513.
Johnson, D., Percins, C., Arkko, J., 2004. Mobility Support
in IPv6, IETF RFC 3775.
Nikander, P., Arrko, J., Aura, T., Montenegro, G.,
Nordmark, E., 2005. Mobile IP version 6 Route
Optimization Security Design Background, IETF
Internet-draft.
Thomson, S., Narten, T., 1998. IPv6 Stateless Address
Autoconfiguration, IETF RFC 2462.
Veigner, C., Rong, C., 2004. A new Route Optimization
protocol for Mobile IPv6 (ROM), International
Computer symposium 2004, Taipei.
FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6
43