Enhancing SVO logic for mobile IPv6 security protocols

Ilsun You, Yoshiaki Hori, Kouichi Sakurai

Research output: Contribution to journalArticlepeer-review

25 Citations (Scopus)

Abstract

In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node's address as a public key certificate to authenticate its public key because no global public key infrastructure is available in MIPv6 environments. In addition, they execute an appropriate address test to check if a node exists at its claimed address. With such security features, the protocols prevent critical attacks including redirect, man-in-the middle, and denial of service ones. On the other hand, it is clearly of paramount importance to formally evaluate the MIPv6 security protocols to design them without flaws. Unfortunately, there is lack of the formal verification method to precisely reason about their correctness while considering their unique security properties to our best knowledge. In this paper, we propose an extended SVO logic for the thorough verification of the MIPv6 security protocols. Then, we show its effectiveness by applying the proposed logic to four security protocols.

Original languageEnglish
Pages (from-to)26-52
Number of pages27
JournalJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Volume2
Issue number3
Publication statusPublished - Jan 1 2011

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Enhancing SVO logic for mobile IPv6 security protocols'. Together they form a unique fingerprint.

Cite this