IP%20Address%20Location%20Privacy%20and%20Mobile%20IPv6:%20Problem%20Statement - PowerPoint PPT Presentation

About This Presentation
Title:

IP%20Address%20Location%20Privacy%20and%20Mobile%20IPv6:%20Problem%20Statement

Description:

IP Address Location Privacy and Mobile IPv6: Problem Statement ... any IPv6 address, an HoA or a CoA can be profiled. Compromise in location privacy could lead ... – PowerPoint PPT presentation

Number of Views:45
Avg rating:3.0/5.0
Slides: 7
Provided by: koo9
Learn more at: https://www.ietf.org
Category:

less

Transcript and Presenter's Notes

Title: IP%20Address%20Location%20Privacy%20and%20Mobile%20IPv6:%20Problem%20Statement


1
IP Address Location Privacy and Mobile IPv6
Problem Statement
  • draft-irtf-mobopts-location-privacy-PS-00.txt
  • Rajeev Koodli

2
Background
  • The problem presented at IETF 62
  • (draft-koodli-mip6-location-privacy-00.txt)
  • The Problem Statement draft requested from
    MobOpts
  • Revised the original draft with feedback from RG

3
Background (MIP6)
  • Mobile IP defines two IP addresses
  • Home Address (HoA)
  • The MNs fixed identifier
  • Visible in all packets the MN uses whether on its
    home network or a visited network
  • Care of Address (CoA)
  • The MNs routable address on a visited network
  • Visible in all packets sent from the visited
    network

4
The Roaming problem
  • HoA on a visited network reveals device (and
    possibly user) roaming to an on-looker
  • CoA reveals device (and possibly) user roaming to
    a correspondent
  • Related Profiling problem
  • As with any IPv6 address, an HoA or a CoA can be
    profiled
  • Compromise in location privacy could lead to more
    targeted profiling (e.g., track movement patterns
    of a MN)

5
Issues to address
  • Support for route optimization
  • Signaling overhead considerations for Mobile
    IPv6, including Return Routability and IPsec
  • Static or dynamic HoA allocation

6
ML input
  • .. tracing the BU messages via the sequence
    number can also reveal in real time to an
    eavesdropper the path taken by an unknown mobile
    node, i.e., by linking the BU messages and
    consequently the pseudo-IP addresses. However,
    the ability to follow the movements in real time,
    combined with some prior infos about one
    particular target can lead to break the user's
    anonymity.
Write a Comment
User Comments (0)
About PowerShow.com