The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Integration of heterogeneous networks is one of the important characters of next-generation networks. As different access technologies may offer different attributes, it becomes a very important and challenging issue to ensure users access the most suitable network at any time, and make seamless handover while moving between different heterogeneous networks. In this paper propose an intelligent seamless...
SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility...
Communication facilities for vehicles became more and more important over the last years. Most time this involves the usage of wireless technologies for communication between vehicles, between vehicles and the roadside, as well as between the vehicle and systems reachable via Wide Area Networks (WANs) such as the Internet. This paper discusses how Internet technologies can be used for supporting the...
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
Security has become a critical requirement of MIPv6 which will play an important role in next generation mobile network. Although some effective solutions have been proposed, but there is still a serious problem existed which concerns about security compatibility between MIPv6 node (MN) and the access network (AN). A policy-based distributed security management method is presented to solve this problem...
The limitation of each wireless technologies in terms of coverage, bandwidth or delay, has enforced the concept of integrated heterogeneous high speed wireless access. However, with the integration of different technologies provided by different operators, maintaining security remains a challenging proposition. When a mobile device moves in and out of the coverage of one wireless network to another...
With the development of mobile network and computer technology, MIPv6 is brought to the internet. Taking care of the security concerns about network connection, we bring AAA system into the mobile network. In order to be permitted in the integrated architecture of MIPv6 and AAA systems, the users have to get network access permission and AAA response from AAAH. This paper presents an optimization...
The Web 2.0 paradigm is all about the development of applications and content at the edge of the network by anyone. This ldquowisdom of the crowdrdquo type of activity resulted in a large number of applications being introduced in short time frames utilizing the telecom network as a ldquodumb piperdquo. However, IMS may open up the business opportunities for the cellular operators where they can take...
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In this paper, we provide an overview of security issues for smartphones and give a...
Naming and addressing are important issues for next generation Internet (NGI). In this paper, we discuss a new mobility and multihoming supporting identifier locator split architecture (MILSA). There are three main contributions of our solution. First, we separate trust relationships (realms) from connectivity (zones). A hierarchical identifier system for the realms and a Realm Zone Bridging Server...
A hybrid analysis method for protocol is proposed which combines the power of both manual and automatic methods. At first, it defines a number of attack goals and then studies how to achieve these goals by misusing the messages. An automatic analysis tool is applied in order to reach completeness based on the manual analysis. Some of the found attacks are excluded because of the low feasibility in...
Protocol security dealing with mobility is strongly necessary since mobile nodes are more prone to attacks. The Context Transfer Protocol allows applications running on mobile nodes to operate with minimal disruption by transferring contexts between access routers. In this paper, after a practical study using the AVISPA tool and a more conceptual one, we will show that this protocol does not work...
Military communications currently require secure end-to-end, resilient connectivity via multi-homed connections, and need to support both mobile hosts and mobile networks. Today, such functions are possible to some degree, but the functions are not harmonised. Standards that support these functions were designed independently and implemented in isolation. So, achieving converged capabilities for optimal...
We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while they move. We have protocol that can support movement of communicating node without any disruption of their connection status named Mobile IP (MIP). But, the major problem of this MIP is too heaviness of the protocol for small mobile nodes. So, IETF now propose Proxy MIP...
IP traceback in MANET (mobile ad-hoc network) is more difficult than in traditional wired network because of the dynamically-changing topologies and limitation in resource. Researches in IP traceback for MANET largely follow the similar approaches as in the wired network and are having difficulties in overcoming the above mentioned topology and resource limitation problem. We suggest to cope with...
Mobility aware applications have been proposed several times in the past in order to compensate for the weakness of the standard IP model in a mobile environment. Such applications are aware of the network conditions and are able to adapt themselves to such variable conditions. They can even get involved into flow routing and interface management. The solutions proposed by literature are mainly related...
Contrast with the current WLAN (wireless local area network) security mechanism worked in data link layer. IPSec over WLAN worked in IP layer has his superiorities. But as a security mode originally used in wired network, IPSec uses IKE (Internet key exchange protocol) as default that need a large number of computation is not fit for mobile devices of WLAN. Besides, IPSec protocol does not fit mobile...
Route optimization provides a short path between the mobile node and the correspondent node in mobile IPv6 protocol and makes them communicate efficiently. Some insider attacks were found while analyzing vulnerability of the route optimization. The simulation experiment shows that the insider attacks make the mobile node fail in using optimized route, and it results in performance degradation and...
This paper proposes solutions for the trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6. Two operation modes are supported for different scenarios: The first one is authentication-only mode for the scenario that the mobility anchor point only needs to ensure any binding update messages are from the claimed mobile nodes. The second one is authentication...
With dynamic home agent address discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suffers from security problems as the signaling is not authenticated nor integrity protected. The IETF has defined SEcure Neighbor Discovery that is providing security for the IPv6 Neighbor Discovery protocol, based on several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.