Early Binding Updates for Mobile IPv6
|
|
- Laurence York
- 8 years ago
- Views:
Transcription
1 Early Binding Updates for Mobile IPv6 Christian Vogt, Roland Bless, Mark Doll, Tobias Küfner, IEEE Wireless and Communications and Networking Conference New Orleans, March 15, 2005 Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 1
2 Mobile IPv6 Scenario FTP Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 2
3 Outline Mobile IPv6 basics Security and efficiency Proposed optimization Early Binding Updates Credit-Based Authorization Analysis Conclusion Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 3
4 Mobile IPv6 Basics Mobile Care-of Address Home Address Internet 3000::/ ::/64 Home Address = global ID above IP Care-of Address = locator Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 4
5 Mobile IPv6 Basics Mobile Care-of Address Home Address Internet 3000::/ ::/64 Home Address = global ID above IP Care-of Address = locator Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 5
6 Be Aware! Issue 1: Impersonation Attacker binds a false HoA to some CoA Unauthorized use of a HoA connection Victim's peer hi-jacking, eavesdropping, man-in-the-middle attacks, DoS Man i/t middle (false HoA) Victim (true HoA) Issue 2: Packet Misdirection Amplification Attacker redirects packets to a false CoA Unauthorized use of a CoA flooding Attacker (true CoA) Attacker's peer Victim (false CoA) Solution: HoA/CoA-ownership proofs (HoA/CoA tests) Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 6
7 What Mobile IPv6 Does About It Relationship btw. MN and HA Long-lasting Pre-configuration: Credentials, authorization records Mobile IPv6: IPsec authentication Relationship btw. MN and CN Usually without history No pre-configuration Key exchange insufficient; HoA/CoA-ownership proof required Mobile IPv6: non-cryptographic HoA/CoA tests Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 7
8 What Mobile IPv6 Does About It Mobile Detach Attach Registration with HA RFC 3775 Registration with CN Home Address Test Care-of Address Test Binding Update to CN Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 8
9 And How This Performs Mobile 1 RTT Detach Attach Last packet First packet Registration with HA Home Address Test Care-of Address Test RFC 3775 Binding Update to CN Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 9
10 And How This Performs Mobile Detach Attach Last packet 2 RTT Registration with HA Home Address Test First packet Care-of Address Test RFC 3775 Binding Update to CN Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 10
11 Our Objectives Need Optimization Which significantly reduces handover latency across domains and without special network support Related Work Local: Hierarchical Mobile IPv6, Fast Handovers pro: low latency, zero packet loss con: network support required, no inter-domain optimization End-to-end: Cryptographically Generated Addresses pro: cryptographic HoA-ownership proof, eliminates HoA test con: CoA test still required Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 11
12 Our Approach: Early Binding Updates Mobile Do this test before handover! Register early with the CN! Use CoA during test! Detach Attach Early Binding Updates Home Address Test Registration with HA Early Binding Update to CN Care-of Address Test Binding Update to CN Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 12
13 Unverified Care-of Addresses Issue: CoA unverified for a while Period of vulnerability btw. Early and standard Binding Update Negligible in some scenarios, usually requires additional protection Solution: Prevent amplification Observation: amplification (not misdirection per se) makes redirection-based flooding attractive Rationale: no amplification redirection-based flooding unattractive Credit-based technique Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 13
14 Our Solution: Credit-Based Authorization Mobile Acquires credit by sending pkts. Consumes credit for being sent pkts. to unverified CoA Maintains credit account Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 14
15 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 15
16 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 16
17 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 17
18 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 18
19 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 19
20 Our Solution: Credit-Based Authorization Mobile Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 20
21 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 21
22 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 22
23 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 23
24 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 24
25 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 25
26 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown! Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 26
27 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 27
28 Our Solution: Credit-Based Authorization Mobile Detach Attach CoA unverified Signaling not shown Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 28
29 Asymmetric Traffic Patterns Issue: Asymmetric Traffic Patterns Some applications feature asymmetric traffic patterns No sufficient credit upon handover Solution: Credit for Packet Reception and Processing Feedback mechanism for CN Care-of Address Spot Checks (in-band extension of CoA tests) Not covered here Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 29
30 How Much Do We Benefit? Mobile Corresp'dnt Mobile Corresp'dnt Last packet 1 RTT Other Last packet First packet First packet RFC 3775 Early Binding Updates Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 30
31 How Much Do We Benefit? Mobile Corresp'dnt Mobile Corresp'dnt Last packet Last packet 2 RTT 1 RTT First packet First packet RFC 3775 Early Binding Updates Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 31
32 Analysis of Early Binding Updates Advantages of Early Binding Updates Half of standard latency, or less No special network support Applicable to inter-domain handovers Drawbacks of Early Binding Updates Additional signaling for proactive HoA tests (if done periodically) Still 1 RTT latency Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 32
33 Scenario 1: TCP Throughput Seqno RFC E6 3,678KB Early Binding Updates 4,363KB 3.0E6 50ms 50ms 2.0E6 50ms One-Way Times 1.0E6 x+5s x+10s x+15s x+20s x+5s x+10s x+15s x+20s Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 33
34 Preliminary Results of TCP Experimentations Seqno RFC E6 Early Binding Updates 4,226KB 2.5E6 2,296KB 100ms,256kbps 100ms,256kbps 50ms 256kbps 1.5E6 One-Way Times & Bandwidths 0.5E6 x+5s x+10s x+15s x+20s x+5s x+10s x+15s x+20s Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 34
35 Conclusion Current Status Implementation in FreeBSD 5.3, Kame-Shisa Mobile IPv6 Ongoing work in IETF, IRTF; CBA now to be integrated into HIP Open Issues Impacts on applications? Effects on TCP retransmission timers? Future Perspectives Proactive registration before handover eliminate remaining delays Christian Vogt, Research Institute of Telematics, University of Karlsruhe, Germany 35
Efficient End-to-End Mobility Support in IPv6
Efficient End-to-End Mobility Support in IPv6, Mark Doll, doll@tm.uka.de, Communicating Anywhere, Anytime 1 Mobile IPv6 Basics mobile node @ home address Internet visited network home network correspondent
More informationEarly Binding Updates and Credit-Based Authorization A Status Update
Status update New drafts Implementation Experimentation results Early Binding Updates and Credit-Based Authorization A Status Update Why Do We Need Enhancement? Mobile IPv6 Route Optimization uses return-routability
More informationMIP6 Route Optimization Enhancements
MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationResearch Article A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol
Hindawi Publishing Corporation EURA Journal on Wireless Communications and Networking Volume 2008, Article ID 348594, 8 pages doi:10.1155/2008/348594 Research Article A Two-Layered Mobility Architecture
More informationPerformance Evaluation of a QoS-Aware Handover Mechanism
Performance Evaluation of a QoS-Aware Handover Mechanism 1.Introduction Background Requirements in mobile communication Seamless mobility support Guarantee certain levels of QoS Mobile communications over
More informationBoosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationSecurity issues with Mobile IP
Technical report, IDE1107, February 2011 Security issues with Mobile IP Master s Thesis in Computer Network Engineering Abdel Rahman Alkhawaja & Hatem Sheibani School of Information Science, Computer and
More informationMOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
More informationMobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
More informationQuality-of-Service Support for Mobile Users using NSIS Roland Bless, Martin Röhricht Networking 2009, Aachen
Quality-of-Service Support for Mobile Users using NSIS Roland Bless, Martin Röhricht Motivation 1 More and more resource demanding Internet applications and multimedia streams video broadcasts, Voice-over-IP,
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationNetwork Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6
More informationPacket Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationHierarchical Mobility Management for VoIP Traffic
Hierarchical Mobility Management for VoIP Traffic Archan Misra Subir Das Anthony J McAuley Telcordia Technologies, Inc 445 South Street Morristown, NJ 07960 1 Abstract A hierarchical IP-based mobility
More informationAnalysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang
More informationIEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices. Abstract
IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices Date: May 12, 2003 Authors: Huai-An (Paul) Lin Intel Corp. 2111 NE 25 th Avenue, OR 97124 Phone: +1 503-264-6726 E-mail: huai-an.lin@intel.com
More informationPerformance Evaluation of Two Layered Mobility Management using Mobile IP and Session Initiation Protocol
Performance Evaluation of Two Layered Mobility Management using Mobile IP and Session Initiation Protocol Jin-Woo Jung*, Hyun-Kook Kahng**, Ranganathan Mudumbai*, Doug Montgomery * * National Institute
More informationSecurity Issues in Space Networks
Security Issues in Space Networks Mohammed Atiquzzaman and Md. Shohrab Hossain School of Computer Science The University of Oklahoma, Norman, OK 73019 shohrab@ou.edu, atiq@ou.edu Abstract Satellites are
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo Pascual Departament d Arquitectura de Computadors Universitat Politècnica de Catalunya
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationA O T. Heterogeneous Networks and Mobility User Perspective. Agententechnologien in der Telekommunikation Sommersemester 2009. Lecture 4 20.05.
Heterogeneous Networks and Mobility User Perspective Agententechnologien in der Telekommunikation Sommersemester 2009 Thomas Geithner thomas.geithner@dai-labor.de Lecture 4 20.05.2009 Agententechnologien
More informationMobility Management Advanced
Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model
More informationNetwork Friendliness of Mobility Management Protocols
Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK
More informationAPNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &
More informationLink Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
1 Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo-Pascual Abstract A foreseeable scenario is where on the Internet Mobile IPv6 is deployed
More informationA Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
More informationFirewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
More informationIP Flow Mobility: Smart Traffic Offload for Future Wireless Networks
1 IP Flow Mobility: Smart Traffic Offload for Future Wireless Networks Antonio de la Oliva, Carlos J. Bernardos, Maria Calderon, Telemaco Melia and Juan Carlos Zuniga Universidad Carlos III de Madrid,
More informationA Solution for IP Mobility Support in Software Defined Networks
A Solution for IP Mobility Support in Software Defined Networks You Wang and Jun Bi Institute for Network Sciences and Cyberspace Department of Computer Science Tsinghua National Laboratory for Information
More informationDOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
More informationMobility Management in Military Networks
1 Multilayered Mobility Management for Survivable Network Ashutosh Dutta, James Burns, K. Daniel Wong, Ravi Jain, Ken Young Telcordia Technologies, 445 South Street, Morristown, NJ 07960 Henning Schulzrinne
More informationBasic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationSecurity Overview on Mobile IP Networks
Security Overview on Mobile IP Networks Osama Ali Abdelgadir 1, Amin Babiker A.Nabi 2, Ashraf Gasim Elsid Abdalla 3 1 Alneelain University, Department of Electronics & Communication Engineering, Faculty
More informationProactive DAD: An L2-assisted Fast Address Acquisition. Strategy for Mobile IPv6 Networks
Proactive DAD: An L2-assisted Fast Address Acquisition Strategy for Mobile IPv6 Networks Chien-Chao Tseng Department of Computer Science and Information Engineering National Chiao-Tung University Hsinchu,
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationSecuring VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn Andreas.Schmidt@bsi.bund.de Abstract
More informationMOBILITY MANAGEMENT ARCHITECTURE FOR 4G NETWORKS. This chapter discusses the design of proposed mobility management
118 Chapter 3 MOBILITY MANAGEMENT ARCHITECTURE FOR 4G NETWORKS This chapter discusses the design of proposed mobility management (MM) architecture for future 4G networks. As indicated earlier in previous
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationAn End-System Approach to Mobility Management for 4G Networks and its Application to Thin-Client Computing
An End-System Approach to Mobility Management for 4G Networks and its Application to Thin-Client Computing Leo Patanapongpibul a Glenford Mapp b Andy Hopper a leo.p@cantab.net g.mapp@mdx.ac.uk ah12@cam.ac.uk
More informationProtecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
More informationA Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications
A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications G. Iapichino, C. Bonnet Mobile Communications Department Eurecom Sophia Antipolis, France {Iapichin, Bonnet}@eurecom.fr
More informationAn Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
More informationLow-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
More informationA Network-Controlled Architecture for SCTP Hard Handover
A Network-Controlled Architecture for SCTP Hard Handover Khadija Daoud, Karine Guillouard, Philippe Herbelin Orange Labs, Issy Les Moulineaux, France {first name.last name}@orange-ftgroup.com Abstract
More informationChapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
More informationHow To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
More informationIP Networking Untethered
IP Networking Untethered Alan O NeillO Flarion Technologies Reliable link Low delay Link Layer Wish List Far fewer end-to to-end retransmissions Better Efficient transport layer (TCP/IP) User Experience
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationIPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
More informationSecurity vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
More informationHandover Management based on the Number of Retries for VoIP on WLANs
Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationInternet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr
Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP
More informationUser authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
More informationSecured VPN Models for LTE Backhaul Networks
Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi
More informationVulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
More informationVoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
More informationAdaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6
Tamkang Journal of Science and Engineering, Vol. 12, No. 4, pp. 481 487 (2009) 481 Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6 Ying-Hong Wang, Chih-Peng Hsu* and
More informationSCTP-Sec: A secure Transmission Control Protocol
SCTP-Sec: A secure Transmission Control Protocol Rahul Choudhari Indian Institute of Information Technology & Management, Gwalior, INDIA Email: rahul.choudhari@iiitm.ac.in { Somanath Tripathy Indian Institute
More informationA Major Functionality in Next Generation Networks Using -- Mobility Management
A Major Functionality in Next Generation Networks Using -- Mobility Management Sunil kumar J, Satyanarayana Gadadda, K.Sateesh Kumar Assistant Professor, Department of Electrical and computer science Engineering,
More informationIntroducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationTRIM: an Architecture for Transparent IMS-based Mobility
TRIM: an Architecture for Transparent IMS-based Mobility Ivan Vidal a,, Antonio de la Oliva a, Jaime Garcia-Reinoso a, Ignacio Soto b a Universidad Carlos III de Madrid. Avda. de la Universidad 30 28911
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationUsing the Domain Name System for System Break-ins
Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis trep@cs.ucr.edu CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name
More information6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
More informationMAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
More informationSURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6
SURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6 BASED NETWORK 1 Nitul Dutta, 2 Iti Saha Misra, 3 Kushal Pokhrel and 4 Md. Abu Safi 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
More informationReliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
More informationApplication DDoS Mitigation
Application DDoS Mitigation Revision A 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Volumetric vs. Application Denial of Service Attacks... 3 Volumetric DoS Mitigation...
More informationMobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
More informationVoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: info@network-research-group.org This paper presents the
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationA Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationProxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks
IACSIT International Journal of Engineering and Technology, Vol. 4, No. 5, October 12 Proxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks N. P. Singh and Brahmjit Singh
More informationLink Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
More informationPerformance Evaluation for Mobility Management Protocols in Cellular IP and Hawaii Mobile Networks
Performance Evaluation for Mobility Management Protocols in Cellular IP and Hawaii Mobile Networks M.Mansour, A.Ghneimat,J. E. Mellor Department of Computing University of Bradford Bradford BD7 1DP, UK.
More informationENHANCEMENTS FOR SIMULTANEOUS ACCESS IN NETWORK-BASED LOCALIZED MOBILITY MANAGEMENT
ENHANCEMENTS FOR SIMULTANEOUS ACCESS IN NETWORK-BASED LOCALIZED MOBILITY MANAGEMENT Huu-Nghia Nguyen Mobile Communications Department Eurecom Institute Sophia Antipolis, France Christian Bonnet Mobile
More informationIPv6 Moving Network Testbed with Micro-Mobility Support
IPv6 Moving Network Testbed with Micro-Mobility Support Miklós Aurél Rónai 1, Kristóf Fodor 1, Ralf Tönjes 2 Ericsson Research, 1 Traffic Lab (Hungary), 2 Eurolab (Germany) {Miklos.Ronai, Kristof.Fodor,
More informationA Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com
More informationSecuring IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
More informationMobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More information