Mobile IPv6 control signalling messages generally act as informants to the home agent (HA) and the correspondent node (CN) regarding a mobile node's (MN's) new address when its network attachment point changes. Messages should be protected to avoid different security attacks. In the existing standard, control signalling messages between HA and MN are frequently authenticated with IKEv2 and X.509 certificates via IPSec. These signalling messages between MN and CN are so far protected by an effective but insecure protocol. A protocol that uses Binding Update Route Optimisation has security vulnerabilities that allow redirection of traffic by attackers. This traffic is intercepted and then false binding updates is sent along with packet eavesdropping and Denial of Service (DoS) that disrupts any communication. Due to lack of ineffective authentication procedures to ascertain the validity of the users or hide the location data of HoA and CoA, security issues mentioned above will occur. This paper presents some of existing protecting control signalling message protocols, as well as some proposed approaches for designing a secure method-based private key IP address between an MN and a CN
使用 AI 将内容摘要翻译为中文,便于快速阅读
使用 AI 分析这篇文章的核心发现、关键要点和深度见解
由 DeepSeek AI 提供分析 · 首次使用需配置 API Key