Chapter 6-Mobile Ip
Chapter 6-Mobile Ip
• The Care- of- address defines the current location of the mobile
node from an IP point of view.
• All IP packets sent to the MN are delivered to the COA, not directly
to the IP address of the MN. Packet delivery toward the mobile
node is done using a tunnel.
• To be more precise, the COA marks the endpoint of the tunnel, i.e.
the address where packets exit the tunnel.
5
Components of Mobile IP(cont’d…)
6
Process of Mobile IP
• The mobile IP process has following three main phases, which are:
Agent Discovery
• During the agent discovery phase the HA and FA advertise their
services on the network by using the ICMP router discovery protocol
(IROP).
• Mobile IP defines two methods: agent advertisement and agent
solicitation which are in fact router discovery methods plus
extensions.
7
Process of Mobile IP(cont’d…)
Registration
9
Process of Mobile IP(cont’d…)
• If the COA is at the FA, the MN sends its registration request containing
the COA to the FA which is forwarding the request to the HA.
10
Process of Mobile IP(cont’d…)
11
Process of Mobile IP(cont’d…)
Tunneling
• A tunnel is used to establish a virtual pipe for data packets
between a tunnel entry and a tunnel endpoint.
• Packets which are entering in a tunnel are forwarded inside
the tunnel and leave the tunnel unchanged.
• Tunneling, i.e., sending a packet through a tunnel is achieved
with the help of encapsulation.
• Tunneling is also known as "port forwarding" is the
transmission and data intended for use only within a private,
usually corporate network through a public network.
12
Infrastructure-based wireless networks
g Typical wireless network: Based on infrastructure
i E.g., WLAN, GSM, cellular networks, …
i Base stations connected to a wired backbone network
i Mobile nodes communicate wirelessly to these base stations
i Traffic between different mobile nodes is relayed by base
stations and wired backbone
i Mobility is supported by switching from one base station to
another
i Backbone infrastructure required for administrative tasks
h er Gateways IP backbone
u rt ork
F tw
ne s
Server
Router
13
Infrastructure-based wireless networks – Limits?
g What if …
i No infrastructure is available?
– E.g., in disaster areas
i It is too expensive/inconvenient to set up?
– E.g., in remote, large construction sites
i There is no time to set it up?
– E.g., in military operations, Battle field
14
Solution: (Wireless) ad hoc networks
g Try to construct a network without infrastructure, using
networking abilities of the participants
i This is an ad hoc network – a network constructed “for a
special purpose”
g Simplest example: Laptops in a conference room –
a single-hop ad hoc network
15
Why Ad Hoc Networks ?
g Ease of deployment
g Speed of deployment
16
What is an Ad hoc Network?
17
MANET: Mobile Ad hoc Networks
A collection of wireless mobile nodes dynamically forming
network topology without any existing infrastructure.
18
MANET…
Key features:
– Dynamic network topology
– Distributed network nature
– Multihop communication
– Limited bandwidth
– Energy constrains
– Vulnerability to intruders and
malicious attacks
Advantages:
– Easy to develop
– No infrastructure required
19
MANET: Applications
g Personal area networking
i cell phone, laptop, ear phone, wrist watch
g Military environments
i soldiers, tanks, planes
g Civilian environments
i meeting rooms
i sports stadiums
i boats, small aircraft
g Emergency operations
i search-and-rescue
i policing and fire fighting
20
MANET: Applications…
g Military applications
i Situational Awareness (SA) and Command and
Control (C2) for military.
21
Applications for infrastructure-less networks
g Disaster recovery g Car-to-car
communication
g Asymmetric Capabilities
i transmission ranges and radios may differ
i battery life at different nodes may differ
i processing capacity may be different at different nodes
i speed of movement
g Asymmetric Responsibilities
i only some nodes may route packets
i some nodes may act as leaders of nearby nodes (e.g., cluster head)
24
MANET: Many Variations…
g Traffic characteristics may differ in different mobile ad hoc networks
i bit rate (bandwidth fluctuation)
i timeliness constraints (CBR, VBR, FTP)
i reliability requirements (TCP, UDP)
i unicast / multicast / geocast
i host-based addressing / content-based addressing / capability-based addressing
25
MANET: Many Variations…
26
MANET: Characteristics, complexities, and
design constraints
g Autonomous and infrastructure-less:
i MANET does not depend on any established infrastructure
or centralized administration, such as base stations, for
their operations.
g Multi-hop routing:
i No default router is available. Every node works as a router
and forwards each others’ packets to provide information
sharing between mobile nodes.
g Dynamically changing network topologies:
i In MANET, nodes can move randomly and arbitrarily. Due to
the random movement of nodes, the network topology
changes frequently and unpredictably, which results in:
1- Route changes
2- Frequent network partitions and possibly
3- Packet losses. 27
MANET: Characteristics, complexities, and design constraints…
g Bandwidth optimization:
i Wireless links have basically lower capacity than the wired links.
g Limited resources:
i Mobile nodes depend on limited battery power, processor speed, and
storage capacity.
g Scalability:
i Mobile network shall be able to provide all the services in the presence of
large number of nodes.
28
MANET: Characteristics, complexities, and
design constraints…
g Infrastructure-less and self operated:
i There is no fixed infrastructure or base station that
coordinates the operation of mobile nodes.
• Each node should participate, cooperate, and acts as a
router to manage and forward each other’s packet.
g Poor Transmission Quality:
i high bit error rate (BER), which results from signal
attenuation, is a typical characteristic of ad hoc networks.
g Limited physical security:
i In MANET,
• the topology of the network changes dynamically and
• nodes can enter and leave the network without any
authentication
– It is very much vulnerable to different types of
security attack. 29
Introduction to wireless network security
32
Wi-Fi network security methods(cont’d…)
g Encryption
• A more common method of protecting Wi-Fi networks and devices is the
use of security protocols that utilize encryption.
• Encryption in digital communications encodes data and then decodes it
only for authorized recipients.
• There are several types of encryption standards in use today, including
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2).
• Most newer network devices, such as access points and Wi-Fi routers,
feature built-in wireless-security encryption protocols that provide Wi-Fi
protection.
33
Wi-Fi network security methods(cont’d…)
34
Wi-Fi security software
• A vast array of security software aimed at the consumer and enterprise
markets can provide protection to wireless networks and Wi-Fi-enabled
devices such as routers, switches, controllers, and access points.
• Many of these solutions are downloadable to wireless LANs (WLANs)
and mobile devices.
• Some newer software solutions designed to secure Wi-Fi are built into
the backbone of the internet and are available via cloud platforms.
• These solutions provide a first line of defense against breaches of
wireless networks by preventing users from accessing malicious sites.
35
wireless security protocols
• WEP
• The first wireless security protocol was WEP (Wired Equivalent Privacy).
• It was the standard method of providing wireless network security from
the late 1990s until 2004.
• WEP was hard to configure, and it used only basic (64-/128-bit)
encryption.
g WPA
• WPA (Wi-Fi Protected Access) was developed in 2003.
• It delivers stronger (128-/256-bit) encryption than WEP by using a
security protocol known as Temporal Key Integrity Protocol (TKIP).
36
wireless security protocols(cont’d…)
g WPA2
• WPA2, a later version of WPA, was developed in 2004.
• It's easier to configure and provides even greater network security than WPA by
using a security protocol known as the Advanced Encryption Standard (AES).
g WPA3
• A new generation of WPA, known as WPA3, is designed to deliver simpler
configuration and even stronger (192-/256-/384-bit) encryption and security
than any of its predecessors.
• It is also meant to work across the latest Wi-Fi 6 networks.
37
Wi-Fi network security devices
g Active device
• There are several types of commercially available devices that can
provide network security by blocking adversarial attacks and unwanted
network traffic.
• One type is known as an "active" device, which is hardware configured
to block surplus network traffic.
• Examples of these devices for Wi-Fi network security include firewalls,
antivirus scanners, and content-filtering devices.
38
Wi-Fi network security devices(cont’d…)
g Passive device
g Passive Wi-Fi network security devices detect and report on unwanted
network traffic.
g Passive devices use less power than other Wi-Fi devices.
g They also have an extra layer of security because they can
communicate with Wi-Fi routers only when the routers are seeking them.
g That extra layer makes man-in-the-middle (MITM) attacks more difficult.
g In an MITM attack, an adversary attempts to intercept communications
between two parties to "listen in" on their activity or to modify the traffic
traveling between them.
39
Wi-Fi network security devices(cont’d…)
g Preventive device
• A preventive device, such as a wireless intrusion prevention system
(WIPS), can scan networks to identify potential security issues.
• A WIPS can be integrated into networks or overlaid using standalone
sensors.
• Some WIPSs, however, conduct only intermittent monitoring, leaving
networks occasionally vulnerable.
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
Wi-Fi network security devices(cont’d…)
163
Wi-fi threats(cont’d…)
g Piggybacking
• bad actors can use open or unsecured wireless networks to conduct
illegal activity, monitor web traffic, steal information, and more.
• They can do this by "piggybacking" on the internet service of real
subscribers.
• The bad actors tap into the unsecure service to set up their own internet
connections, without the legitimate users' knowledge.
164