On the Security of the Mobile IP Protocol Family
نویسندگان
چکیده
The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of organizations, including 3GPP, 3GPP2 and Wimax, have realized the need to incorporate these protocols into their architectures. Deployment scenarios reach from mobility support within the network of a single provider to mobility support between different providers and technologies. Current Wimax specifications, for example, already support Mobile IPv4, Proxy Mobile IPv4 and Mobile IPv6. Future specifications will also support Proxy Mobile IPv6. Upcoming specifications in the 3GPP Evolved Packet Core (EPC) will include the use of Mobile IPv4, Dual Stack MIPv6 and Proxy Mobile IPv6 for interworking between 3GPP and non 3GPP networks. This paper provides an overview on the state-of-the-art in IETF mobility protocols as they are being considered by standardization organizations outside the IETF and focusing on security aspects.
منابع مشابه
Security testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملPerformance Analysis of Security Mechanism during Handoff in Mobile Ip
I have examined the final copy of this thesis for form and content, and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Electrical and Computer Engineering. iv DEDICATION This thesis is dedicated to my beloved parents, all my family members and friends who have supported and encouraged me throughout my life. Without th...
متن کاملSecure Mobile IP Using IP Security Primitives - Enabling Technologies: Infrastructure for Collaborative Enterprises, 1997., Proceedings Sixth IEEE
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with I P sec...
متن کاملAuthenticated Ad Hoc Routing at the Link Layer for Mobile Systems
We have built an experimental link-level authenticated ad hoc routing protocol and integrated it with the PSU version of Mobile-IP. The routing protocol is intended to address survivability and link security issues. In our modiied version of Mobile-IP, we authenticate ICMP router discovery packets, which are sent by both Mobile-IP agents and mobile nodes. The router discovery packets allow syst...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کامل