Network mobility (NEMO) security: Threats and solutions

被引:0
|
作者
Dinakaran, M. [1 ]
Balasubramanie, P. [2 ]
机构
[1] School of IT and Engg, VIT University, India
[2] Department of CSE, Kongu Engineering College, India
关键词
Mobile security - Network security - Routers - Internet protocols - Quality of service - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
The success of mobile communication, shows that the interest in users to access the Internet or their official networks on the move. This mobility support may be needed for a single user or group of nodes called as movable sub networks. Network Mobility (NEMO) protocol developed by IETF enables the mobile nodes and networks to maintain connectivity to their network or Internet by change their point of attachment to from one access network to another. NEMO is an extension of Mobile IPv6, this works based on tunneling the data from home agent to mobile router. The Quality of Service provided by the NEMO is measured based on the routing mechanism it operates, hand off latency and the way of secured data transfer. Though the tunneling process ensures the security of data, the various nodes involved in NEMO are vulnerable as the network is wireless without a proper infrastructure. This article presents a survey on possible threats and solutions for NEMO protocol and its extensions. © 2005-2012 JATIT & LLS. All rights reserved.
引用
收藏
页码:77 / 82
相关论文
共 50 条
  • [41] Intrusion Threats And Security Solutions For Autonomous Vehicle Networks
    Boumiza, Safa
    Braham, Rafik
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 120 - 127
  • [42] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [43] A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions
    Kumar, Chandan
    Arya, Y. D. S.
    Agarwal, Gaurav
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1963 - 1967
  • [44] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [45] RFID systems: A survey on security threats and proposed solutions
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 159 - 170
  • [46] A Review of Security Threats, Solutions and Trust Management in VANETs
    Premasudha, B. G.
    Ram, V. Ravi
    Miller, J.
    Suma, R.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 38 - 57
  • [47] An Overview of Security Threats, Solutions and Challenges in WBANs for Healthcare
    Mucchi, Lorenzo
    Jayousi, Sara
    Martinelli, Alessio
    Caputo, Stefano
    Marcocci, Patrizio
    2019 13TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2019, : 151 - 156
  • [48] Security of IoT Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Mezquita, Yeray
    AMBIENT INTELLIGENCE-SOFTWARE AND APPLICATIONS-13TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE, 2023, 603 : 86 - 100
  • [49] A Review on Host vs. Network Mobility (NEMO) Handoff Techniques in Heterogeneous Network
    Raju, Vikram R.
    Garg, Kumkum
    Dahiya, Anil Kumar
    Kuriakose, Jeril
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [50] The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
    Lincy, N. L.
    Midhunchakkaravarthy
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 107 - 117