1. Field of the Invention
The present invention relates to route optimization for a moving network. In particular, the present invention relates to provide security in direct communication between a correspondent node and a node in a mobile network, thereby achieving route optimization.
2. Discussion of the Related Art
To optimize routes between nodes in a moving network and nodes outside the mobile network, it is desired that a reliable and authorized proxy network node can be used to inform correspondent nodes about movements of network address owners within the mobile network.
U.S. Patent Application Publication 2002/0133607 entitled “Address Mechanisms in Internet Protocol” (the “Nikander Application”) discloses using a one-way coding function to generate an Internet Protocol (IP) address from components specific to a host. The resulting IP address can then be claimed by the host. In the Nikander Application, a recipient of a message from the host can reconstruct and check the IP address using the components. The claiming host may use an authentication protocol or a public key cryptographic protocol to establish data integrity of the message, and ties the components with the IP address.
U.S. Patent Application Publication 2002/0152384 entitled “Methods and Systems for Unilateral Authentication of Messages” (the “Schelest Application”) discloses deriving an IP Version 6 (IPv6) address by hashing the claiming host's public key. In the Schelest Application, a recipient of a message from the claiming host checks the hash of the IPv6 address, and checks a cryptographic signature in the message to verify its data integrity. If both the IPv6 address and the enclosed signature are verified, the recipient accepts the host's claim of ownership over the IPv6 address.
“Crypto-Based Identifiers (CBIDs): Concepts and Applications” (the “Montenegro Paper”) by Gabriel Montenegro and Claude Castellucia, ACM Transactions on Information and System Security, February, 2004, reviews the use of cryptographically generated identifiers for verifying a host's claim of a right to use an address.
U.S. Patent Application Publication 2003/00849293 entitled “Addressing Mechanisms in Mobile IP” (the “Arkko Application”) discloses an owner node delegating the responsibility for its IP address to a second node at the time the address is generated. In the Arkko Application, the IP address may be cryptographically generated using the methods disclosed in the Nikander or the Schelest Applications. Under the method of the Arkko Application, the owner node obtains the public key portion of a public/private key pair from the second node, and creates an authorization certificate by signing with its own private key over the second node's public key. The authorization certificate is then provided to the second node; the authorization certificate may then be distributed in any message relating to the owner node's IP address. The second node signs such a message—which includes the authorization certificate—with its private key. A recipient of the message uses the second node's public key to authenticate the message and the owner node's public key to authenticate the authorization certificate. The cryptographic hash of the IP address verifies the owner node's right to the IP address and the second node's public key verifies the authorization certificate, thereby establishing the second node's right to send the message on behalf of the owner node.
IETF Request for Comment (RFC) 3972 by Tuomas Aura, March 2005, discloses cryptographically generating an IPv6 address and securing the claim of authorization for the IPv6 address using the neighbor discovery protocol (RFC 2461 and RFC 2462). The IPv6 address is generated using both the cryptographic hash of the public key of the owner node and additional information. 64 bits of cryptographic hash serve as the interface identifier of the IPv6 address.
U.S. Patent Application Publication 2002/0152380 entitled “Methods and Systems for Unilateral Authentication of Messages” (the “O'Shea Application”) discloses using a host's public key (e.g., the method described in the Schelest Application) to cryptographically generate a Mobile IPv6 home address and a care-of address. When the mobile node is outside the home subnet, the Mobile IPv6 home agent in the home network forwards data packets bound for the home address to the care-of address. The mobile node may request that a correspondent node addresses packets directly to the care-of address, rather than through the home address, thus improving routing performance—a process called “binding update for route optimization.” The signaling to optimize routing in this manner requires proof that the mobile node is authorized to claim the new care-of address. The proof may be provided using the cryptographic properties of the network address and a public key signature on the signaling packets. The mobile node signs the binding update signaling packet with the private key corresponding to the public key used to generate the network address. The signaling packet is sent with the source address set to the new, cryptographically generated care-of address. Also included in the signaling packet is the cryptographically generated home address and the mobile node's public key. Upon receiving the signaling packet, the correspondent node checks that the source address and home address can be generated from the included public key, and then checks the signature. If both the source address and the public key are verified, the correspondent node accepts the signaling packet.
RFC 3971 by Jari Arkko, James Kempf, Brian Zill, and Pekka Nikander, March 2005, discloses extending the IPv6 Neighbor Discovery Protocol (described in RFC 2461 and 2462) for secure advertising and defending network addresses, and for secure discovery of last hop IP routers. A node generates a cryptographically generated address according to an algorithm described in RFC 3972, and signs neighbor advertisement packets with an RSA signature. The neighbor advertisement packets claim ownership of the address. This claim is proved by the cryptographic property of the address and the signature on the packet establishes data origin authentication on the packet. Thus, the receiving node can trust that the packet as having come from the claimed source address, and the message establishes the claiming node's authority to claim the network address. The SEND protocol additionally allows for secure discovery of last hop routers. In RFC 3972, a format for a certificate on last hop routers is specified. A router possessing such a certificate signs a router advertisement messages with the private key counterpart of its certified public key. A node seeking a last hop router obtains the router's certificate and a certificate chain leading back to a commonly shared trust root from the router. The node uses the router's certified key to verify the signature on the router advertisement message, thereby obtaining a certified last hop router.
IETF draft “draft-arkko-mipshop-cga-cba-04” (the “Arkko Draft”) by Jari Arkko, Christian Vogt, and Wassim Haddad, June 2006, discloses extending Mobile IPv6 for secure route optimization for a Mobile IPv6 node. In the Arkko Draft, a mobile node sends directly to its correspondent node binding update messages to optimize a propagation route. The correspondent node verifies the claimed address ownership of the mobile node using the mobile node's public key, as disclosed in the RFC 3972. In addition, by reducing the binding update signaling load, it tries to reduce a handoff delay. Redirection based flooding attacks during address ownership verification are prevented by limiting the amount of packet transmission at both nodes.
RFC 3963 by Vijay Devarapalli, Ryuji Wakikawa, Alexandru Petrescu, and Pascal Thubert, January 2005, discloses a protocol for providing a mobile network with connection to the Internet. On behalf of each node inside the mobile network (the “mobile network node”), whether or not the node has mobility functions, a router having Mobile IPv6 functions (the “mobile router”) carries out mobility support functions to provide connection continuity between the mobile network nodes and the Internet. The mobile router establishes a bi-directional tunnel between it and its home agent. Whenever the mobile router changes its point of attachment, it re-establishes the bi-directional tunnel. Under this arrangement, all packets bound for and transmitted from the mobile network nodes are handled by the mobile router's home agent through the bi-directional tunnel.
As can be seen from the above, the Nikander and Schelest Applications, the Montenegro Paper, RFC 3972, O'Shea Application, and RFC 3971 relate only to cases in which authorization to use the network address is claimed by a single host. In addition, the Arkko Draft relates only to route optimization for Mobile IPv6 nodes. However, it may often be necessary to authorize one or more hosts to use an address, whether or not the nodes support mobility functions. An example of such need may be found in mobile network applications and in routing optimization of a mobile network.
As can be seen from the above, RFC 3963 provides that all packets are to be propagated through a bi-directional tunnel between a mobile router and its home agent. This sub-optimal routing scheme is not necessary if a reliable and authorized proxy mobile router exists, which can send binding update messages directly to correspondent nodes on behalf of mobile network nodes. The correspondent nodes may then verify that the binding update messages including the newly acquired address are sent from an authorized node. However, if a mobile network node is to generate the address using a cryptographic identifier tied to its public key alone, only it can send a secure binding update message. The proxy binding update message by the mobile router must be done without security.
While the Arkko Application discloses an owner node delegating advertising and defense of its address to another party, the solution in the Arkko Application is cumbersome. In the Arkko Application, in addition to using both the owner node's and the delegated node's public keys, an attribute certificate is also required. After generating the address, the attribute certificate is sent by the owner node to the delegated node. As described in the Arkko Application, the solution in the Arkko Application identifies whether the claimant is the owner node or the delegated node. This information can be used by an attacker to infer the location or other information about the owner host.
According to one aspect of the present invention, a method allows a router to perform proxy secure route optimization inside a mobile network. In one embodiment, a mobile node in a mobile network receives from a mobile router a router advertisement message containing a mobile network prefix and a public key of the mobile router. The mobile node generates a multi-key cryptographically generated address (MCGA) using the mobile network prefix, and both its own public key and the mobile router's public key. This MCGA is then made known to the mobile router. In one embodiment, the mobile router caches the MCGA and the mobile node's public key. Then, the mobile router is authorized to perform secure proxy route optimization.
The present invention also provides a method which allows a mobile router to send binding update messages to correspondent nodes on behalf of the mobile nodes, so as to enable route optimization. In one embodiment, instead of the mobile network node, a mobile router sends a secured binding update message to a correspondent node of the mobile network node. In that instance, the mobile network nodes are relieved of performing mobility functions when a change of location or a change of a care-of address occurs.
According to another aspect of the present invention, a secure protocol allows a correspondent node to verify the authority of a mobile node claiming an address. The correspondent node checks the mobile node's network address and a signature on the message using the public keys that are used to generate the network address. In addition, the mobile node claiming the address includes in its request a signature signed using a private key corresponding to the public key or keys used to create the network address. The signature may be a ring signature formed using all the public keys that form the network address.
According to one aspect of the present invention, a network address may be auto-configured by a mobile network node. The mobile network node creates the network address using a mobile router's public key and a network prefix using a suitable protocol. Examples of suitable protocols include the SEND protocol, or an extension to IPv6 router discovery of mobile node keys. The router may obtain the mobile node's public key by having the mobile node include its public key in standard SEND neighbor discovery messages.
The present invention also provides a method for a mobile node to securely claim and defend a network address. In one embodiment, the method includes receiving an address resolution request for a network address, which is formed from at least the mobile network node's public key and a mobile router's public key. The method responds to the address resolution request by sending a message to the sender, enclosing the public keys. The sender of the address resolution request checks the network address using the public keys received, and verifies a signature on the message, which is signed using a private key by the mobile network node or the mobile router.
Thus, the present invention allows mobile routers to send binding update directly to the correspondent nodes on behalf of IPv6 mobile network nodes for route optimization and allows the correspondent nodes to verify the authorization of the mobile router.
The present invention is better understood upon consideration of the present invention and the accompanying drawings.
The present invention allows mobile routers that use mobile IPv6 for mobility management to securely optimize routing by sending binding update messages directly to the correspondent nodes on behalf of IPv6 mobile network nodes. For example, according to one embodiment, an IPv6 mobile network node generates a multi-key cryptographically generated IPv6 address (MCGA) using a combination of a network prefix, a public key advertised from a mobile router and its own public key. Both the mobile network node and the mobile router may sign and verify a message that claims a network address. When a mobile network changes its point of attachment, the mobile router sends a secure binding update message directly to the correspondent node on behalf of the mobile network node. With this MCGA provided to the correspondent node in a secure manner, subsequent data packets can be sent over an optimized route.
As the Arkko Draft points out, signaling load results in long delay when a Mobile IPv6 node moves.
The above detailed description is provided to illustrate specific embodiments of the present invention and is not intended to be limiting. Numerous modifications and variations within the scope of the present invention are possible. The present invention is set forth in the accompanying drawings.
The present invention is related to and claims priority to U.S. provisional patent application (the “'749 Provisional Application”), entitled “Secure Route Optimization for Mobile Network Using Multi-key Cryptographically Generated Addresses,” Ser. No. 60/735,749, filed on Nov. 10, 2005. The present application is also related to co-pending U.S. patent application Ser. No. 11/377,589 (the “'589 Application”), entitled “Secure Address Proxying Using Multi-key Cryptographically Generated Addresses”, filed on Mar. 16, 2006, and co-pending U.S. patent application Ser. No. 11/377,590 (the “'590 Application”), entitled “Multi-key Cryptographically Generated Address,” filed on Mar. 16, 2006. The '749 Provisional Application, the '589 Application and the '590 Application are hereby incorporated by reference herein in their entireties.
Number | Date | Country | |
---|---|---|---|
60735749 | Nov 2005 | US |