Network mobility (NEMO) security: Threats and solutions

被引:0
|
作者
Dinakaran, M. [1 ]
Balasubramanie, P. [2 ]
机构
[1] School of IT and Engg, VIT University, India
[2] Department of CSE, Kongu Engineering College, India
关键词
Mobile security - Network security - Routers - Internet protocols - Quality of service - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
The success of mobile communication, shows that the interest in users to access the Internet or their official networks on the move. This mobility support may be needed for a single user or group of nodes called as movable sub networks. Network Mobility (NEMO) protocol developed by IETF enables the mobile nodes and networks to maintain connectivity to their network or Internet by change their point of attachment to from one access network to another. NEMO is an extension of Mobile IPv6, this works based on tunneling the data from home agent to mobile router. The Quality of Service provided by the NEMO is measured based on the routing mechanism it operates, hand off latency and the way of secured data transfer. Though the tunneling process ensures the security of data, the various nodes involved in NEMO are vulnerable as the network is wireless without a proper infrastructure. This article presents a survey on possible threats and solutions for NEMO protocol and its extensions. © 2005-2012 JATIT & LLS. All rights reserved.
引用
收藏
页码:77 / 82
相关论文
共 50 条
  • [1] Social network security: Issues, challenges, threats, and solutions
    Rathore, Shailendra
    Sharma, Pradip Kumar
    Loia, Vincenzo
    Jeong, Young-Sik
    Park, Jong Hyuk
    INFORMATION SCIENCES, 2017, 421 : 43 - 69
  • [2] Incorporation of QoS in Network Mobility (NEMO) Network
    Hussien, Loay F.
    Aisha-Hassan, A. H.
    El-Azhary, Ismail
    Hassan, Wan Haslinah
    Habaebi, Mohamed Hadi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12): : 1 - 5
  • [3] Threat analysis on NEtwork MObility (NEMO)
    Jung, S
    Zhao, F
    Wu, SF
    Kim, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 331 - 342
  • [4] Header Compression for Network Mobility (NEMO)
    Rawat, Priyanka
    Bonnin, Jean-Marie
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 2812 - 2816
  • [5] WLAN security threats & solutions
    Majstor, F
    LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 650 - 650
  • [6] Route optimization techniques in network mobility (NEMO)
    Noor, Sahibzada Ahmed
    Janjua, Kashif Azim
    Zhang, Lin
    2007 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2007, : 66 - 70
  • [7] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
  • [8] Cloud Security Threats and Solutions: A Survey
    Butt, Umer Ahmed
    Amin, Rashid
    Mehmood, Muhammad
    Aldabbas, Hamza
    Alharbi, Mafawez T.
    Albaqami, Nasser
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (01) : 387 - 413
  • [9] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [10] A Survey on Threats and Security Solutions for IoT
    Gavra, Vlad-Dacian
    Dobra, Ionut-Marian
    Pop, Ovidiu Aurel
    2020 43RD INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE), 2020,