Presentation is loading. Please wait.

Presentation is loading. Please wait.

MANAGEMENT AND METHODS OF MOBILE IP SECURITY

Similar presentations


Presentation on theme: "MANAGEMENT AND METHODS OF MOBILE IP SECURITY"— Presentation transcript:

1 MANAGEMENT AND METHODS OF MOBILE IP SECURITY
SANKRUPA GANDE (WIU ID: ) VASUDHA JASTI (WIU ID: ARCHANA GURIMITKALA (WIU ID: )

2 INTRODUCTION In the recent years wireless communications has noticed more growth in number of users , in this the mobility is the main advantage of using wireless technology. which helps users to communicate with there mobiles from one network to another network while maintaining their IP address which is permanent. Mobile IP which exits mostly in wireless networks as it increasing its popularity and more beneficial for portable computers where the users need to carry their devices in different networks with different IP address .

3

4 SECURITY ATTACKS There are many security issues for Mobile IP.
The security attacks can happen not only on the host network but also on foreign network . Here we are mainly discussing on two major security attacks in Mobile IP. They are: 1. Denial-Of Service Attack 2. Passive Eavesdropping

5 Denial-Of Service Attack
The Denial-Of Service Attack is referred as once an unauthorized person interrupts the authorized users and fails the work without getting completed. In this attack the unauthorized user or the attacker repeatedly sends the host unwanted requests repeatedly over the internet this ultimately leads to the lagging of useful work and processing this useless work. In some cases, the attacker prevents the useful data to reach the authorized users by redirecting their destination addresses.

6

7 Passive Eavesdropping
In this the attacker listens the messages which are being sent or received between mobile node and its home agent. The attacker steals the information either by physical access to the network or the intruder steals the information by maintaining the close range with the radio signal of the network. This can be resolved by using any encryption medium.

8

9 Security Models In some environments proper security is not maintained between the users while leads to the many attacks. In-order to increase these aspects we have to follow some strong level of security by applying some authentication methods and encryption algorithms By using Tunneling techniques we can reduce many security issues. Using firewalls also prevents us from unwanted access to the files. We can also use Packet Filtering and keep an eye on each packet and verify their source and destination.

10 Conclusion In this project we mainly discussed on the security aspects of the Mobile IP. It also explains in a detailed way of how to overcome the security issues such as Denial-of-service attack, passive eavesdropping and session stealing. Using encryption algorithms and multiple layers of authentication we can overcome the attacks and secure Mobile IP more effectively. Mainly by using firewalls we can achieve integrated security to Mobile IP.


Download ppt "MANAGEMENT AND METHODS OF MOBILE IP SECURITY"

Similar presentations


Ads by Google