Title :
A proactive scheme for securing ID/locator split architecture
Author :
Ruidong Li ; Kafle, Ved P. ; Harai, Hiroaki
Author_Institution :
Nat. Inst. of Inf. & Commun. Technol. (NICT), Tokyo, Japan
fDate :
Oct. 30 2012-Nov. 2 2012
Abstract :
The ID/locator split-based approach has been widely recognized as a promising approach for the design of future networks. However, the existing ID/locator split architectures are still vulnerable to various attacks, such as impersonation attacks and man-in-the-middle attacks. They cannot be simply protected by the existing security mechanisms, which have the limitations especially on scalability. To solve these problems, we propose a proactive scheme for securing ID/locator split architecture, which embeds built-in security features to enable proactive protections of the architecture. Through this scheme, hosts register their information to the network securely, obtain trustworthy information of destination hosts, authenticate each other, and securely update their locators without requiring an involvement of a trusted third party (TTP). Compared to other existing security mechanisms, the proposed scheme does not require additional authentication mechanism and it can provide the thorough protections of the whole architecture.
Keywords :
computer network security; data privacy; TTP; authentication mechanism; future network design; identification-locator split architectures; identification-locator split-based approach; impersonation attack; man-in-the-middle attack; security mechanism; trusted third party; trustworthy information; Authentication; Hip; Public key; Registers; Scalability; Servers; Future Network; ID/Locator split architecture; authentication; security;
Conference_Titel :
Network Protocols (ICNP), 2012 20th IEEE International Conference on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4673-2445-8
Electronic_ISBN :
978-1-4673-2446-5
DOI :
10.1109/ICNP.2012.6459950