{"title":"Security Analysis and Security Optimizations for the Context Transfer Protocol","authors":"F. Allard, J. Combes, R. López, A. Gómez-Skarmeta","doi":"10.1109/NTMS.2008.ECP.87","DOIUrl":null,"url":null,"abstract":"Protocol security dealing with mobility is strongly necessary since mobile nodes are more prone to attacks. The Context Transfer Protocol allows applications running on mobile nodes to operate with minimal disruption by transferring contexts between access routers. In this paper, after a practical study using the AVISPA tool and a more conceptual one, we will show that this protocol does not work in a secure way. We will then propose a first solution to fix the security flaws. However, this solution decreases the context transfer efficiency. Hence, we will finally propose a second solution based on Cryptographically Generated Addresses that guarantees the same security level than the first one and is as efficient as the original CXTP specification.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Protocol security dealing with mobility is strongly necessary since mobile nodes are more prone to attacks. The Context Transfer Protocol allows applications running on mobile nodes to operate with minimal disruption by transferring contexts between access routers. In this paper, after a practical study using the AVISPA tool and a more conceptual one, we will show that this protocol does not work in a secure way. We will then propose a first solution to fix the security flaws. However, this solution decreases the context transfer efficiency. Hence, we will finally propose a second solution based on Cryptographically Generated Addresses that guarantees the same security level than the first one and is as efficient as the original CXTP specification.