Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Security Vulnerabilities and Protection Mechanisms of Mobility Management Protocols
 

Summary: Security Vulnerabilities and Protection Mechanisms of
Mobility Management Protocols
Md. Shohrab Hossain
Mohammed Atiquzzaman
School of Computer Science
University of Oklahoma, Norman, OK 73019
shohrab@ou.edu, atiq@ou.edu
William D. Ivancic
NASA Glenn Research Center
Cleveland, OH 44135.
wivancic@grc.nasa.gov
Abstract--Mobility protocols are originally proposed to sup-
port ongoing Internet connectivity of hosts or networks in
motion. However, the requirement of seamless connectivity
in mobile environment and use of route optimization between
the communicating nodes have introduced several security
vulnerabilities to mobility protocols. In this paper, we ex-
plain with illustrative examples major security threats on var-
ious components of the network involving the mobility pro-
tocol. We have analyzed critically several existing security

  

Source: Atiquzzaman, Mohammed - School of Computer Science, University of Oklahoma

 

Collections: Computer Technologies and Information Sciences