Title :
Security vulnerabilities and protection mechanisms of mobility management protocols
Author :
Hossain, Md Shohrab ; Atiquzzaman, Mohammed ; Ivancic, William D.
Author_Institution :
Sch. of Comput. Sci., Univ. of Oklahoma, Norman, OK, USA
Abstract :
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on various components of the network involving the mobility protocol. We have analyzed critically several existing security solutions that have been proposed to prevent or mitigate security attacks on mobility protocols. We have also identified additional security holes of these existing solutions and propose some simple mechanisms to counter them.
Keywords :
mobility management (mobile radio); protocols; telecommunication network routing; telecommunication security; mobility management protocols; protection mechanisms; route optimization; security attack mitigation; security vulnerability; IP networks; Internet; Mobile communication; Optimization; Protocols; Security; Servers;
Conference_Titel :
Aerospace Conference, 2011 IEEE
Conference_Location :
Big Sky, MT
Print_ISBN :
978-1-4244-7350-2
DOI :
10.1109/AERO.2011.5747350