A Survey on NEMO Security: Threats and Solutions Essay

A Survey on NEMO Security: Threats and Solutions Essay

Length: 1234 words (3.5 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

If the mobile node moves out of its home network, it starts searching a new router called access router to provide service from the visited network. With the help of AR the mobile node will maintain connectivity with its home agent. But if the mobile node joins with a new network, topologically it’s not possible to maintain the address assigned by the home network. So a new address called Care of Address will be assigned by the AR, then the mobile node has to send an update to its home agent about its new care of address. The process of updating new care of address to the respective home agent or correspondent node is called as Binding Update (BU). This process is implemented once again if the mobile node performs hand off. The mobile nodes duty is to update the new binding always to home agent; it ensures the message integrity between these nodes and assures the home agent about the legitimate mobile node. Binding Acknowledgement (BA) message will be a reply from home agent for the update.

An attacker may claim spoofed information that a particular legitimate mobile node is in different location than where it really is. If home agent believes that information and works based on it, then the respective mobile node may not get the traffic at all. A malicious mobile node may use the home address of a victim legitimate node in forged binding update sent to a correspondent node. These kinds of attacks generate the threats against the confidentiality, integrity and availability of the mobile nodes. An attacker may go through the contents of a packet destined to another node by redirecting the traffic to it. This leads to man in middle attack between mobile node and the correspondent node. An attacker may also send forged binding up...

... middle of paper ...

... such scenarios.

The use of Return Routability procedure provides good support to MIPv6 without any security issues. This procedure verifies the message exchange between the home agent and mobile node’s care of address to ensure if both the nodes are reachable. The Binding Update messages are exchanged cryptographically. When symmetric attack is used always the response is sent to the node from where the request has come, which avoids the reflection attack. The correspondent node must wait for authorized binding update form the mobile node. The encapsulation (tunnel) also carried out through encryption between home agent and mobile node with IPSec ESP. Nonse exchange through tunnel avoids the possibility of attackers to verify the nonse message, hence the attack from the visited network can also be prevented.

Works Cited

NEMO, Security, Threats, Attacks

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Importance Of Security And Loss Prevention Essay

- The security industry has experienced vast growth within the past two decades that has thrown it into the public arena as a topical issue. The significant growth in security industry has brought forth the private security as a great contributor to its growth, in which the private sector has embraced an active role in numerous areas of loss prevention and crime (Fischer, Halibozek & Walters, 2012). Security industry just like any other profession is governed and controlled by fundamental principles, which give direction to matters relating to security and loos prevention....   [tags: Security, Risk, Security guard, Risk management]

Strong Essays
1058 words (3 pages)

Security of Pipelines in Eurasia Essay

- ... These actions take place as a result of energy trends, international politics, and how they are interconnected through energy uses that affect the structure of international systems, which are some of the “theoretical and empirical assumptions that underlie the US foreign policy objective of securing the energy supplies” (Beznosov, 2013, p. 1,). The idea of energy security has evolved the concepts of what energy and security provide. Security has been described and analyzed through liberation, absence of threats, low probability of damage, and actions to prevent threats (Beznosov, 2013, Unit- 1, lecture, 1)....   [tags: resources, energy, politics, security]

Strong Essays
1914 words (5.5 pages)

Essay on Combat All Types Of Threats

- In this day and age, war is not as simple as it once was. With new threats on the rise, national security has become a difficult thing to maintain. New technology, specifically drones and cyber technology, and non-state actors, primarily private military corporations, have changed warfare as we know it. It is arguable whether or not these things make the United States more vulnerable or provide new opportunities to confront new types of threats. The first half of this memo will explore how these might make the United States susceptible to all types of threats, while the second half will study how these new trends in warfare allow the United States to combat all types of threats....   [tags: Military, United States, Armed forces, Battle]

Strong Essays
1594 words (4.6 pages)

Computer Network Security Alternatives Essay

- Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions....   [tags: Computer Network Security Essays]

Free Essays
776 words (2.2 pages)

Florida Youth Substance Abuse Survey Essay

- The Discrepancy Statement The Florida Youth Substance Abuse Survey recognizes in the Osceola County Report (2014) that 18.0% White Non-Hispanic, 50.1% Hispanic and 9.9% African American in Osceola County School District abuse illicit substances. To address, prevent and decrease the probability of drug addiction by Hispanic students of the two chosen high schools from Osceola County by at least 3% in approximately one year. As noticeably in chart one and two the prevalent student populations in these schools are Hispanic groups....   [tags: Drug addiction, Addiction, Substance abuse]

Strong Essays
1033 words (3 pages)

Solutions For Ensuring Success Of Expansion With A Satellite Clinic Essay

- The challenges discussed must be overcome and recommendations for solutions for ensuring success of expansion with a satellite clinic. Strategies. Increasing the availability of care for the community to focus healthy lifestyles, providing job security for employees and sustained viability for investors is the goal of PMH with the satellite clinic. Recent healthcare reforms provide PMH with several opportunities to expand, with the ACA increasing the number of ensured patients, which will increase payments (Bradley, Gandhi, Neumark, Garland, & Retchin, 2012)....   [tags: Patient, Hospital, Health, Problem solving]

Strong Essays
965 words (2.8 pages)

A Security Plan for Businesses by Virtual Protectors Essay

- Today business is moving faster than it ever has before. With the Internet and e-commerce, even brick and mortar businesses are now open twenty-four hours a day and seven days a week. However, there are security threats that linger with this new age of business that need to be mitigated. According to a survey by the National Cyber Security Alliance (NCSA) and Symantec, a company that offers security solutions, seventy-seven percent of small businesses believe that they will not fall victim to security issues (Symantec, 2012)....   [tags: technology, IT protection]

Strong Essays
1382 words (3.9 pages)

Security Threats in IT Organizations Essay example

- Not a lot of IT organizations realize what the threats to their network are. Allowing Internet access on their network exposes them to such threats that could leave them needing new hardware. It’s not only that, there are certain threats that cannot be avoided (but can have a backup plan). These threats (no matter the nature) pose a threat in terms of data loss and damage to the hardware. In terms of intrusion the frontier has changed a lot. The threats that disturbed organizations just a year ago have evolved into something much more malicious, ignoring them will be a fool’s mistake....   [tags: network, threats, hardware, attacks, block]

Strong Essays
532 words (1.5 pages)

Questions On Information Security Threats Essay

- Task 1 Information Security Threats Information systems are presented to various sorts of security threats which can result with critical finance related loses and harm to the data framework assets. The sources of security risks are distinctive, and can beginning from inside or outside of data framework office, and can be purposeful or inadvertent. Security threat can be characterized as each event that can come about with data privacy, respectability and accessibility breaches, or with some other type of IS resources harm....   [tags: Information security, Computer security, Computer]

Strong Essays
724 words (2.1 pages)

Internet Security Threats Essay

- This paper is going to be on the different security threats on the internet, and the different ways to prevent and protect yourself from them. The different threats that are going to be covered are viruses, trojan horses, hackers, spam, corrupt IP packets, port scanner attacks, DOS(denial of service) attacks, spider attacks, worms and socail attacks. Also, I will cover different security practices and computer software and hardware that can help protect and prevent these different attacks on your computer, or network....   [tags: Internet Security ]

Strong Essays
1607 words (4.6 pages)