Network mobility (NEMO) security: Threats and solutions

被引:0
|
作者
Dinakaran, M. [1 ]
Balasubramanie, P. [2 ]
机构
[1] School of IT and Engg, VIT University, India
[2] Department of CSE, Kongu Engineering College, India
关键词
Mobile security - Network security - Routers - Internet protocols - Quality of service - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
The success of mobile communication, shows that the interest in users to access the Internet or their official networks on the move. This mobility support may be needed for a single user or group of nodes called as movable sub networks. Network Mobility (NEMO) protocol developed by IETF enables the mobile nodes and networks to maintain connectivity to their network or Internet by change their point of attachment to from one access network to another. NEMO is an extension of Mobile IPv6, this works based on tunneling the data from home agent to mobile router. The Quality of Service provided by the NEMO is measured based on the routing mechanism it operates, hand off latency and the way of secured data transfer. Though the tunneling process ensures the security of data, the various nodes involved in NEMO are vulnerable as the network is wireless without a proper infrastructure. This article presents a survey on possible threats and solutions for NEMO protocol and its extensions. © 2005-2012 JATIT & LLS. All rights reserved.
引用
收藏
页码:77 / 82
相关论文
共 50 条
  • [21] Evaluation of QoS supported in Network Mobility NEMO environments
    Hussien, L. F.
    Abdalla, A. H.
    Habaebi, M. H.
    Khalifa, O. O.
    Hassan, W. H.
    5TH INTERNATIONAL CONFERENCE ON MECHATRONICS (ICOM'13), 2013, 53
  • [22] Bot armies as threats to network security
    Banks, Sheila B.
    Stytz, Martin R.
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [23] Solutions to Threats and Risks for the National Security of Slovenia
    Ivanusa, Teodora
    Mulej, Matjaz
    Podbregar, Iztok
    UNDERSTANDING AND MANAGING THREATS TO THE ENVIRONMENT IN SOUTH EASTERN EUROPE, 2010, : 327 - +
  • [24] Cloud security: Emerging threats and current solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 126 - 140
  • [25] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764
  • [26] Current threats to and technical solutions for voice security
    Collier, MD
    2002 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2002, : 2685 - 2695
  • [27] Wireless Sensor Networks: Security, Threats, and Solutions
    Inayat, Usman
    Ali, Fahad
    Khan, Hafiz Muhammad Ashja
    Ali, Syed Moshin
    Ilyas, Kiran
    Habib, Habiba
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 689 - 694
  • [28] MOBNET: The design and implementation of a network mobility testbed for NEMO protocol
    Lan, KC
    Perera, E
    Petander, H
    Dwertmann, C
    Libman, L
    Hassan, M
    2005 14TH IEEE WORKSHOP ON LOCAL & METROPOLITAN AREA NETWORKS (LANMAN), 2005, : 25 - 30
  • [29] NEtwork MObility (NEMO) support in Interworking Heterogeneous Mobile Networks
    Munasinghe, Kumudu S.
    Jamalipour, Abbas
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [30] Using NEMO to support Network Mobility within Railway Infrastructures
    Noor, Rafidah Md
    Edwards, Christopher
    ITST: 2009 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORT SYSTEMS TELECOMMUNICATIONS, 2009, : 74 - 79