CFP last date
22 April 2024
Reseach Article

Approach towards Realizing the Security Threats for Mobile IPv6 and Solution Thereof

by Amrit Ghosh, Prasun Chakrabarti, Pierluigi Siano
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 10
Year of Publication: 2014
Authors: Amrit Ghosh, Prasun Chakrabarti, Pierluigi Siano
10.5120/15758-4417

Amrit Ghosh, Prasun Chakrabarti, Pierluigi Siano . Approach towards Realizing the Security Threats for Mobile IPv6 and Solution Thereof. International Journal of Computer Applications. 90, 10 ( March 2014), 26-30. DOI=10.5120/15758-4417

@article{ 10.5120/15758-4417,
author = { Amrit Ghosh, Prasun Chakrabarti, Pierluigi Siano },
title = { Approach towards Realizing the Security Threats for Mobile IPv6 and Solution Thereof },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 10 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number10/15758-4417/ },
doi = { 10.5120/15758-4417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:42.087455+05:30
%A Amrit Ghosh
%A Prasun Chakrabarti
%A Pierluigi Siano
%T Approach towards Realizing the Security Threats for Mobile IPv6 and Solution Thereof
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 10
%P 26-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile IPv6 has been developed to sustain a seamless mobility in IP network which consists of many favorable characteristics in comparison to the previous Mobile IP protocol, i. e. Mobile IPv4. Unfortunately, Mobile IPv6 is badly affected by security threats like eavesdropping, secure route optimization, connection hijacking and denial of services and security issues are one of the major concerns which should be rectified. This paper entails an algorithm that contains all security components viz. authentication of services, confidentiality and integrity of data packets during communication, secrecy of key management and thus it would be able to nullify all types of security threats in Mobile IPv6 in anycast environment.

References
  1. Perkins, C. , E. , "Mobile IP: Updated", IEEE Communications Magazine, Volume-40, Number-5, Pages: 66-82, 2002.
  2. Perkins, C. , E. , "IP Mobility Support for IPv4: Revised ",
  3. Request for Comments - 5944, Internet Engineering Task
  4. Force (IETF), November 2010.
  5. Perkins, Ed. , Johnson, D. and Arkko, J. , "Mobility Support in IPv6", "A Survey of Mobility Support in the Internet", Request for Comments - 6275, Internet Engineering Task Force, July 2011.
  6. Sudanthi, S. , "Mobile IPv6 GSEC", Version 1. 4b, SANS Institute InfoSec Reading Room.
  7. Radhakrishnan, R. , Jamil, M. , Mehfuz, S. and Moinuddin, "A robust return routability procedure for mobile IPv6", International Journal of Computer Science and Network Security (IJCSNS), volume-8, No-5, pages 243-240, May 2008.
  8. Zao, J. , K. and Condell, M. , "Use of IPSec in Mobile IP", November 1997.
  9. Perkins, C. , E. , Charles, E. and Johnson, D. , B. , "Route Optimization in Mobile IP", 6th Sept.
  10. Soliman, H. , Castelluccia, C. , Malki, K. , and Bellier, L. , "Hierarchical MIPv6 mobility management", Internet Draft, IETF, 2002.
  11. Network Simulator ns-2 http://www. isi. edu/nsnam/ns/.
  12. Hsieh, R. , Fhmip ns extension, 2003.
  13. Ernest, T. , "Mobi Wan: A NS-2. 26 simulation platform for Mobile IPv6 in Wide Area Networks", 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile IPv6 Secure route optimization Anycast Register Agent.