Network mobility (NEMO) security: Threats and solutions

被引:0
|
作者
Dinakaran, M. [1 ]
Balasubramanie, P. [2 ]
机构
[1] School of IT and Engg, VIT University, India
[2] Department of CSE, Kongu Engineering College, India
关键词
Mobile security - Network security - Routers - Internet protocols - Quality of service - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
The success of mobile communication, shows that the interest in users to access the Internet or their official networks on the move. This mobility support may be needed for a single user or group of nodes called as movable sub networks. Network Mobility (NEMO) protocol developed by IETF enables the mobile nodes and networks to maintain connectivity to their network or Internet by change their point of attachment to from one access network to another. NEMO is an extension of Mobile IPv6, this works based on tunneling the data from home agent to mobile router. The Quality of Service provided by the NEMO is measured based on the routing mechanism it operates, hand off latency and the way of secured data transfer. Though the tunneling process ensures the security of data, the various nodes involved in NEMO are vulnerable as the network is wireless without a proper infrastructure. This article presents a survey on possible threats and solutions for NEMO protocol and its extensions. © 2005-2012 JATIT & LLS. All rights reserved.
引用
收藏
页码:77 / 82
相关论文
共 50 条
  • [31] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [32] Protecting against threats to enterprise network security
    Department of Accounting and Information Technology, York College, City University of New York, United States
    Software World, 2006, 2 (14-15):
  • [33] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [34] Security and privacy threats in RFID traceability network
    Chu Chao-Hsien
    Journal of Southeast University(English Edition), 2008, (English Edition) : 132 - 135
  • [36] Cognitive Radio Network Security Threats: A Review
    Mishra, Nikita
    Srivastava, Sumit
    Sharan, Shivendra Nath
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 333 - 338
  • [37] Mobility and security in IP network
    Ringapin, A
    Ben-Othman, J
    Urien, P
    13TH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOL 1-5, PROCEEDINGS: SAILING THE WAVES OF THE WIRELESS OCEANS, 2002, : 280 - 284
  • [38] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [40] 5G Security: Analysis of Threats and Solutions
    Ahmad, Ijaz
    Kumar, Tanesh
    Liyanage, Madhusanka
    Okwuibe, Jude
    Ylianttila, Mika
    Gurtov, Andrei
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 193 - 199