COMMUNICATION advertising messages for indicating their presence.

COMMUNICATION BETWEEN THE NODES MIPV4:Mobile IP allows users to move from one network to another network and stay connected with the internet connection.

Another network can be office, home or any premise.In Mobile IPV4, Mobility agents send agent advertising messages for indicating their presence. Once the message is received by the mobile node, it can identify whether it’s attached to the home network or to the foreign network. When the mobile node travels to the different location then it takes the different IP Address which is Care-of- Address (CoA). This Mobile Node registers its Care of Address with its Home Agent. This CoA changes when it moves to one network to another. The home agent receives all the datagrams distended to the mobile node’s home address and tunnels the datagrams to the Care of Address.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Finally delivered to the Mobile Node.The datagrams sent by the Mobile Node are generally delivered to the destination using the standard routing which means that datagrams don’t pass through the home agent because when the datagrams are sent from the Home agent to CoA the IP Header destination is protected from the routers between the Home network and Current address of the Mobile Node.COMMUNICATION BETWEEN THE NODES MIPV6:In Mobile IPv6, When the Mobile Node is located away from the home network, it is assigned with a Care-of-Address (CoA).

This care-of-address is registered with a home agent (HA), thereby giving the home agent a mobile node’s current attachment location. The association between the Mobile Node Home address and the Care-of- Address is known as binding. IPV6 node maintains the cache of this binding which is known as a binding cache.

Mobile Node also registers with a router in the home subnet to act as a Home agent when it is away from home. The home agent then tunnels all the packets received for the mobile node to the node’s present Care-of-Address which is indicated in the binding cache. For this tunneling process, the Home Agent encapsulates this packet using the IPV6 encapsulation.If a Corresponding node wants to communicate with the Mobile node then it needs to know about the binding of the Mobile Node. To accomplish this, the Corresponding node adds the binding of the Mobile Node in its Binding Cache. While sending the packet to the mobile node, the ipv6 node checks its binding cache for the entry of the destination address.

If the entry is found, then the packets are sent directly to the Mobile Node ‘s Care-of-Address.In case if the entry is not found in its binding cache, then the corresponding Node sends the packets directly to the Mobile Node’s home agent. CITATION Fay07 l 3081 (Nada, 2007)COMPARISON ON PROPOSED SECURITY MECHANISMS OF MIPV4 AND MIPV6:MIPV6 MIPV4IPSec ESP (Encapsulating Security Payload) will be able to provide the establish the Authentication for the message between the Mobile Node and the Home Agent.

Dos Attacks can be prevented by using the Firewall through which the datagrams can be transmitted. Good Authentication mechanism can be introduced to get rid of another DOS attack. Replay Attacks can also be avoided using an Authentication Mechanism. Link Layer Encryption can be used for the message between the Mobile Node and the Home Agent.Return Routability Procedure will be able to provide the Authentication for the message between the Mobile Node and the Corresponding Node. This procedure helps to maintain the security between the Node.

Eavesdropping can be avoided using the end-to-end Encryption for the message between the Mobile Node and the Corresponding Node.CGA (Cryptographically Generated Addresses) is derived from the basics that it the part of an IPV6 address (128 bits) which is generated from the Public Key of the Node.Once the message is received by the Corresponding Node from the Mobile Node now the CN can be sure that the message is sent really by the MN by verifying its address which consists of the Public Key. The validity of this Public Key can be check by the Forming a CGA address and then the signature can be verified.

CITATION 1Vi13 l 3081 (Vishwajit K. Barbudhe, 2013)To tackle some security issues, Other than the solutions above Firewalls can provide security. For this purpose, three basic type Firewalls can be used.

CITATION Sha13 l 3081 (Shakeel Ahmad, 2013)CONCLUSION:MIPV4 is an extension from the ipv4 whereas MIPV6 is the important feature of IPV6. So IPv6 has some inbuilt features which enhance security. Even though MIPV6 is more secure than MIPV4, it still has security flaws, but various techniques proposed in MIP6 can shield the network from various attacks and can avail a secure network.

BIBLIOGRAPHY: BIBLIOGRAPHY l 3081 Nada, F. (2007). Performance Analysis of Mobile IPv4 and Mobile IPv6. The International Arab Journal of Information Technology, 153-160.Shakeel Ahmad, I. A. (2013). Security Issues and Solutions in MIPv4 and MIPV6.

International Journal of Computer Architecture and Mobility .Vishwajit K. Barbudhe, A. K. (2013).

Mobile IPv6 :Threats and Solution. International Journal of Application or Innovation in Engineering ; Management, 265-268.


I'm Casey!

Would you like to get a custom essay? How about receiving a customized one?

Check it out