scholarly journals Mobile IPv6 Security Framework Using Transport Layer Security for Communication between the Mobile Node and Home Agent

Author(s):  
B. Patil ◽  
H. Tschofenig ◽  
D. Kroeselberg
EXPLORE ◽  
2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Muhammad Multazam

Mobile IP merupakan protocol yang mendukung mobilitas dari user, dengan mobile IP sebuah node dapat terus berkomunikasi dengan node yang lain dimanapun dia berada. Mobile IPv6 memperbolehkan node yang telah mempunyai dukungan terhadap IPv6 untuk meninggalkan jaringan asalnya sementara node tersebut sedang memperbarui koneksinya ke internet. Hal ini berarti bahwa mobile IPv6 bisa mengidentifikasi tiap-tiap node dengan static address-nya, tanpa memperhatikan point of attachment nya ke internet.Mobile IPv6 yang digunakan pada makalah ini memakai metode triangle tunneling yaitu metode perutean pengiriman paket dimana ketika correspondent node (CN) mengirimkan paket menuju mobile node (MN), home agent (HA) mengambil alih paket tersebut dan mengirimkannya ke care of address dari MN dengan tunneling, sedangkan MN dapat mengirimkan langsung menuju CN. Pada makalah ini dilakukan pengujian video conference (multipont) pada jaringan Mobile IPv6 dengan metode triangle tunneling untuk diukur parameter-parameter QoS meliputi packet loss, delay, jitter, throughput dan MOS.Berdasarkan hasil uji coba dengan memperhatikan parameter-parameter QoS yang dianalisa terlihat bahwa kualitas MN yang berada di jaringan asalnya (homenet) lebih baik ketika berada di jaringan yang sedang dikunjungi (visitnet), hal ini disebabkan dengan metode triangle tunneling paket yang dikirim menuju MN dirutekan ke HA terlebih dahulu sehingga meningkatkan trafik jaringan, selain itu pada uji coba handover terdapat nilai rata-rata delay yang cukup besar yaitu 3.367 detik untuk paket video dan 3.269 detik untuk paket audio, karena pada saat handover, MN membutuhkan waktu untuk memperbaharui koneksi dan melakukan konfigurasi ulang jaringan yang ada.


2013 ◽  
Vol 347-350 ◽  
pp. 2038-2042
Author(s):  
Zheng Xiang ◽  
Zheng Ming Ma

IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) locates in IPv6 network, and Correspondent Node (CN) locates in IPv4 network, while Mobile Node (MN) moves within IPv4 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. We use the MIP table to realize the communication between the IPv4 entities and the IPv6 entities. The creation, usage and update processes of MIP table are described in this paper. And it can work compatibly with RFC3344 and RFC3775.


At the current era Security and Protection is of vital significance. While there is no system that is immune to attack, a steady and effective system-security-framework is fundamental to ensuring the protection of data. On a fundamental-level, we are living in a more technologically advanced world than we were as of a decade ago. This rise in the broad utilization of technology carried with it and ascent in network attack. Networked PCs have taken over practically all parts of our lives, they store and deal with a ton of data that whenever traded off could bring about critical results. Secure Sockets Layer and Transport Layer Security(SSL/TLS) are presently broadly embraced innovation to give security. SSL/TLS convention is made to give privacy to delicate data trade over the Web. They can be used to secure secrecy and protection however can in like manner be used to shroud vindictive exercises. Regardless, assurance right now in all the information being scrambled independent of whether the information is malignant or not. The SSL-Attackers don’t utilize a particular system for the assault, the attacker may attempt to stick the system by making superfluous-traffic. Using Anomaly-Detection-technique we find the outliers by analyzing the data-captured using Wireshark and identify any possible attack on the network. For detecting outlier in the traffic we have used ABOD technique contained in the PyOD-library, which is an open-source toolbox provided in Python for identification of anomaly on multi-variate information. Anomaly-Based-Detection is a practical and realistic option for identification of attack against securityconvention.


2014 ◽  
Vol 2014 ◽  
pp. 1-16
Author(s):  
Peer Azmat Shah ◽  
Halabi B. Hasbullah ◽  
Ibrahim A. Lawal ◽  
Abubakar Aminu Mu’azu ◽  
Low Tang Jung

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).


2021 ◽  
Author(s):  
Ronaldo Serrano ◽  
Ckristian Duran ◽  
Trong-Thuc Hoang ◽  
Marco Sarmiento ◽  
Akira Tsukamoto ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document