We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Analysis of Mobile IP Protocols Security

by Amit Gupta, Sumit Miglani, Maninder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 4
Year of Publication: 2012
Authors: Amit Gupta, Sumit Miglani, Maninder Singh
10.5120/6893-9226

Amit Gupta, Sumit Miglani, Maninder Singh . Analysis of Mobile IP Protocols Security. International Journal of Computer Applications. 46, 4 ( May 2012), 1-9. DOI=10.5120/6893-9226

@article{ 10.5120/6893-9226,
author = { Amit Gupta, Sumit Miglani, Maninder Singh },
title = { Analysis of Mobile IP Protocols Security },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 4 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number4/6893-9226/ },
doi = { 10.5120/6893-9226 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:50.988016+05:30
%A Amit Gupta
%A Sumit Miglani
%A Maninder Singh
%T Analysis of Mobile IP Protocols Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 4
%P 1-9
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. We first explain all the possible threats evolved due to route optimization technique and then possible defense mechanism to counter them. We have analyzed all that defense mechanism through comparative discussion and tried to find out best solution which may be more efficient and less complex

References
  1. D. Johnson, C. E. Perkins, and J. Arkko, "Mobility support in IPv6," IETF RFC 3775, June 2004.
  2. Hesham Soliman. Mobile IPv6: Mobility in a Wireless Internet. Addison-Wesley, 2004.
  3. P. Nikander, J. Arkko, T. Aura, G. Montenegro, and E. Nordmark, "Mobile IP version 6 route optimization security design background," IETF RFC 4225, Dec. 2005.
  4. J. Arkko and P. Nikander, "How to authenticate unknown principals without trusted parties," in Proc. of the 10th International Workshop. Security Protocols. Cambridge, UK. Springer, Apr. 2002, pp. 5–16.
  5. D. Hu, D. Zhou, and P. Li, "PKI and secret key based mobile IP security," in International Conference on Communications, Circuits and Systems, Guilin, China, June 2006, pp. 1605–1609.
  6. Tuomas Aura, Michael Roe," Designing the Mobile IPv6 Security Protocol", Vol. 61 no. 3-4, March-April 2006, Network and information systems security.
  7. S. Thomn and T. Narten. 1Pv6 Stateless Address Autoconfiguration. Internet Engineering Task Force, Dccember 1998.
  8. Pekka Nikander, Tuomas Aura, Jari Arkko and Gabriel Montenegro, Mobile IPversion 6 (MIPv6) route optimization security design. In Proc. IEEE VehicularTechnology Conference Fall 2003, Orlando, FL USA, October 2003. IEEEPress.
  9. Christian Huitema, Routing in the Internet. Prentice Hall, 1995.
  10. C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet Key Exchange Protocol Version 2 (IKEv2)," IETF RFC 5996, September 2010.
  11. S. Kent, "IP Authentication Header," IETF RFC 4302, Dec 2005.
  12. S. Kent, "IP Encapsulating Security Payload (ESP)," IETF RFC 4303, Dec 2005.
  13. T. Aura, "Cryptographically Generated Addresses (CGA)," IETF RFC 3972, March 2005.
  14. G. O'Shea and M. Roe, "Child-proof authentication for MIPv6 (CAM)," ACM Computer Communications Review, vol. 31, no. 2, April 2001.
  15. Thomas Narten and Richard Draves. Privacy extensions for stateless address auto configuration in IPv6. RFC 3041, IETF, January 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ipv6 Network Security Route Optimization Mobility Protocol Denial Of Service Return Routability Internet Key Exchange Protocol.