跳到主要內容

簡易檢索 / 詳目顯示

研究生: 黃明賢
Ming-Hsien Huang
論文名稱: 可動態更新金鑰之Mobile IP安全註冊協定研究
指導教授: 陳奕明
Yi-Ming Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系在職專班
Executive Master of Information Management
畢業學年度: 91
語文別: 中文
論文頁數: 66
中文關鍵詞: 會議金鑰會談盜用重送攻擊安全註冊協定VPNMobile IP
相關次數: 點閱:9下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Mobile IP係根據IETF所提出的繞徑協定標準,提供行動節點在不改變應用程式及IP的前提下,仍能夠漫遊於IP網路之中,隨著無線網路存取需求增加,以Mobile IP提供使用者在IP網路下無縫隙漫遊(seamless roaming)的服務將是未來之趨勢。但由於近年來電腦網路安全威脅日深,Mobile IP此一機制亦有可能遭受惡意攻擊,例如Mobile IP安全註冊協定(Registration Protocol) 中若Home Agent未對Mobile Node(MN)做認證,很有可能被有心人士冒充進而免費使用網路資源或使合法之MN無法接收訊息等,故
    Mobile IP安全註冊協定必須加以保護。此外MN的運算能力是有限的,設計Mobile IP的註冊協定時,亦需將MN的運算能力考慮進去,針對以上的問題和設計考量,本論文提出一套以對稱式加密法為基礎並以Nonce來達到相互認證同時可以動態變換通訊雙方通訊金鑰的安全註冊協定。和其他的類似研究比較,本協定具有五項特色:(1)MN註冊程序可與分配通訊金鑰的步驟結合(2)通訊金鑰可動態更新(3)可以防止重送及會談盜用等攻擊(4)MN計算之軟硬體需求簡單(5)Scalability佳,除了這些特色,我們的協定也可適用於企業使用VPN的情況。


    目錄 第一章、緒論……………………………………………………………………1 1.1、研究背景與動機………………………………………………………………………1 1.2、研究目的………………………………………………………………………………2 1.3、研究方法………………………………………………………………………………2 1.4、研究假設與限…………………………………………………………………………3 1.5、研究結果與貢獻………………………………………………………………………4 1.6、章節架構………………………………………………………………………………5 第二章、文獻探討………………………………………………………………6 2.1、Mobile IP 簡介………………………………………………………………………..6 2.2、Mobile IP安全註冊協定的相關研究……………………………………………….11 第三章、可動態更新金鑰之Mobile IP安全註冊協定……………………..33 3.1、可動態更新金鑰之Mobile IP安全註冊協定……………………………………...33 3.2、支援MN在網域內漫游之探討…………………………………………………….42 3.3、支援VPN情況下之探討……………………………………………………………45 第四章、安全性及效率比較分析……………………………..………………47 4.1、Mobile IP安全註冊協定之安全性比較分析………………………………………47 4.2、Mobile IP安全註冊協定之效率分析比較…………………………………………49 第五章、結論與未來研究方向……………………………………………….51 5.1、結論………………………………………………………………………………….51 5.2、未來研究方向……………………………………………………………………….52 參考文獻……………………………………………………………………….53 附錄A、密碼學中認證技術 ………………………………………………….57 附錄B、Mobile IP安全註冊協定符號說明…………………………………65 圖表目錄 圖 1- 1 研究方法 3 圖 2- 1 代理人探索 9 圖 2- 2 MN資料接收路徑 10 圖 2- 3 註冊程序(REGISTERING THE COA) 12 圖 2- 4 MOBILE IP相關研究(本研究整理) 12 圖 2- 5 MOBILE IP安全註冊協定 13 圖 2- 6 攻擊者對MOBILE IP實施重送攻擊的方式 16 圖 2- 7 MINPUB之MOBILE IP安全註冊協定訊息流程 18 圖 2- 8 CERTIFICATE-BASED 之MOBILE IP安全註冊協定 20 圖 2- 9 MIP /AAA 信任模式:基本模式 22 圖 2- 10 MIP /AAA 信任模式:仲介模式 23 圖 2- 11 MIP/AAA之MOBILE IP安全註冊協定訊息交換流程 24 圖 2- 12 MIP/AAA 之MOBILE IP安全註冊協定安全性分析 28 圖 2- 13 會談盜用(SESSION STEALING)攻擊步驟 31 圖 3- 1 可動態更新金鑰之MOBILE IP安全註冊協定預先建立之信賴關係 34 圖 3- 2 可動態更新金鑰之MOBILE IP安全註冊協定動態建立之信賴關係 35 圖 3- 3 可動態更新金鑰之MOBILE IP安全註冊協定挑戰與回應訊息流程 36 圖 3- 4 可動態更新金鑰之MOBILE IP安全註冊協定-FA採取行動 37 圖 3- 5 可動態更新金鑰之MOBILE IP安全註冊協定-AAAL採取行動 37 圖 3- 6 可動態更新金鑰之MOBILE IP安全註冊協定-AAAH採取行動 38 圖 3- 7 可動態更新金鑰之MOBILE IP安全註冊協定-HA採取行動 39 圖 3- 8 可動態更新金鑰之MOBILE IP安全註冊協定-AAAH採取行動(2) 40 圖 3- 9 可動態更新金鑰之MOBILE IP安全註冊協定-AAAL採取行動(2) 40 圖 3- 10 可動態更新金鑰之MOBILE IP安全註冊協定-FA採取行動(2) 41 圖 3- 11 可動態更新金鑰之MOBILE IP安全註冊協定-MN採取行動 42 圖 3- 12 MN在網域內漫游情況 44 圖 3- 13 MN在網域內漫游時金鑰分配及註冊之訊息流程 44 圖 3- 14 MOBILE IP企業內網路環境佈建示意圖 45 圖 3- 15 MOBILE IP註冊訊息包含在IPSEC 隧道內之示意圖 46 圖 3- 16 MN與VPN閘道間雙向IPSEC通道 46 表 2- 1 MOBILE IP安全註冊協定弱點及改進處 32 表 4- 1 MOBILE IP 安全註冊協定的比較 50

    參考文獻
    [Abob99] B. Aboba and M. Beadles, “The Network Access Identifier,” IETF RFC2486, Jan.1999.
    [Adra03] F. Adrangi et al., “Problem Statement: Mobile IPv4 Traversal of VPN Gateways,” Internet-Draft,IETF Mobile IP Working Group, April 2003, access from http:// www.ietf.org/internet-drafts/draft-ietf-mobileip-vpn-problem-statement-req-02.
    [Burr90] Burrows M., Abadi, M. and Needham R.,“A Logic of Authentication”, access from http://www.cs.utexas.edu/users/dahlin/Classes/GradOS/papers/p18-burrows.pdf at JAN 2003.
    [Bart02] M. Barton et al., “Integration of IP Mobility and Security for Secure WirelessCommunications,” IEEE International Conference on Communications, ICC 2002, Volume: 2, 2002, Page(s): 1045 –1049.
    [Brad97] Bob Braden et al.,“Resource ReSerVation Protocol (RSVP)-version 1 Functional Specification,” RFC 2205,Network working Group, September 1997, access from http://www.ietf.org/rfc/rfc2205.txt.
    [Caro00] Andrea De Carolis et al.,“QoS-Aware handover for Mobile IP:Secondary Home Agent,”April,2002, access from
    http://www.watersprings.org/pub/id/draft-decarolis-qoshandover-02.txt.
    [Calh00] P. Calhoun and C. Perkins , “Mobile IP Network Access Identifier Extension forIPv4,” RFC 2794, January 2000.
    [Danz01]Danzeisen, “ Secure Mobile IP Communication,” Diploma Thesis, Institute of Computer Science and Applied Mathematics, University of Bern, May 2001.
    [Deng02] R.H. Deng, J. Zhou and F. Bao, “ Defending Against Redirect Attacks in MobileIP”, Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002, ACM Press, Page(s): 59—67.
    [Deer91] S. Deering,“ICMP Router Discovery Messages,” RFC 1256, IETF Network Working Group, September 1991.
    [Gupt98] V.Gupta and G. Montenegro, “Secure and mobile networking,” Mobile Networksand Applications 3, 1998, Page(s): 381–390.
    [Hank94] S. Hanks, T.Li, D. Farinacci, and P.Traina,“Generic Routing Encapsulation(GRE),” RFC 1701,October 1994.
    [John03]F. Johansson and T. Johansson,“AAA NAI for Mobile IPv4 Extension,”March 2003, access from www.ietf.org/internet-drafts/draft-ietf-mobileip-aaa-nai-05.txt.
    [John00] David and Johnson,“Mobile IP in the Current and Future Internet,” Tutorial for MobiCom, 2000.
    [Jaco97] S. Jacob and G. Cirincione, “Security of Current Mobile IP Solutions,” Proceedings of MILCOM 97, Vol. 3,1997, Page(s): 1122 –1128.
    [Mink00] S. Mink, F. Pahlke, G. Schafer and J. Schiller, “Towards secure mobility support forIP networks,” Proceedings of International Conference on CommunicationTechnology, WCC-ICCT 2000, Volume: 1, 2000, Page(s): 555 –562.
    [Ohza02] Satoshi Ohzahata, Shigetomo Kimura and Yoshihiko Ebihara,“A Fast Authentication Method for Secure and Seamless Handoff, ”6th International
    Conference on Information Networking 30 Jan.-2 Feb., 2002.
    [Park97]C. Park,“On Certificate-Based Security Protons for Wireless Mobile Communication Systems,” IEEE Network, Oct. 1997,Page(s): 50–55.
    [Perk03] C. E. Perkins et al., “AAA Registration Keys for Mobile IP”, Internet-Draf, IETFMobile IP Working Group, 22 May 2003, access from http://www.ietf.org/internet-drafts/ draft-ietf-mobileip-aaa-key-12.txt.
    [Perk02]C.E., Perkins, “Mobile IP Support for IPv4,” IETF RFC 3344,Aug. 2002.
    [Perk01] C. Perkins et al.,“Route Optimization in Mobile IP,”IETF Internet Draft, draft-ietf-mobileip-optim-11.tx, Sep 2001.
    [Perk00] C.E., Perkins, “Mobile IP joins forces with AAA,” IEEE Personal Communications [see also IEEE Wireless Communications], Aug. 2000.
    [Perk9a] C.E. Perkins, “Mobile IP and security issue: an overview,” Proceeding of FirstIEEE/Popov Workshop on Internet Technologies and Services, 1999,Page(s):131 –148.
    [Perk9b] C. E. Perkins and Kuang-Yeh Wang , “Optimized Smooth Handoffs in Mobile IP,”Proceedings of the Fourth IEEE Symposium on Computers and Communications,July,1999.
    [Perk97] C.E., Perkins, “Mobile IP,” IEEE Communications Magazine, May 1997, Vol.35 Issue: 5, Page(s): 84 –99.
    [Perk6a]C. Perkins, “IP Encapsulation within IP,” RFC 2003, October 1996.
    [Perk6b]C. Perkins, “Minimal Encapsulation within IP,” RFC 2004, October 1996.
    [Scha01] G. Schaefer, A. festag and H. Karl, “Current Approaches to Authenticationin Mobile and Wireless Communications,”Technical University Berlin Tele- communications Networks Group, Version 1.0, 26/03 2001.
    [Solo98]James D. Solomon, “Mobile IP: The Internet Unplugged, Prentice Hall,” 1998.
    [Stal99] William Stallings, “Cryptography and Network Security: Principles and Practice, Second Edition,” PRENTICE HALL, INC, 1999.
    [Stil01] B. Stiller, L. Kacnelson, C.E. Perkins and P. Dini,“Mobility in a future Internet , ” Proceedings of 26th Annual IEEE Conference on Local Computer Networks, LCN 2001, 2001, Page(s): 24 –30.
    [Stin95] D. Stinson, “Cryptography: Theory and Practice”, Boca Raton, L: CRC Press, 1995.
    [Sufa99] Sufatrio and Yan Lam Kook, “Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication,” Proceedings of FourthInternational Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN ''99), Perth/Fremantle, Australia, 23-25 Jun,1999,Page(s): 364 –369.
    [Wang01]H. Wang and S. Zheng, “The security issues and countermeasures in MobileIP,” Proceeding of IEEE International Conference on Info-tech and Info-net, Vol. 5, Beijing, 29 Dec – 1 Nov, 2001, Page(s): 122 –127.
    [Wu2002] Chun-Hsin Wu et al., “ Bi-Directional Route Optimization in Mobile IP over Wireless LAN, ” Proceedings of 56th IEEE Vehicular Technology Conference, VTC 2002-Fall. 2002, Volume: 2, 2002,Page(s): 1168 –1172.
    [Zao997] J.Zao et al., “A Public-Key Based Secure Mobile IP,” MOBICOM ’97, 1997,Page(s):173 –184.

    QR CODE
    :::