Showing 1–2 of 2 results for author: Moravejosharieh, A
-
Securing Binding Update in Mobile IPv6 Using Private Key Base Binding Update Protocol
Authors:
Hero Modares,
Rosli Salleh,
Amirhosein Moravejosharieh,
Hossein Malakootikhah
Abstract:
Mobile IPv6 control signalling messages generally act as informants to the home agent (HA) and the correspondent node (CN) regarding a mobile node's (MN's) new address when its network attachment point changes. Messages should be protected to avoid different security attacks. In the existing standard, control signalling messages between HA and MN are frequently authenticated with IKEv2 and X.509 c…
▽ More
Mobile IPv6 control signalling messages generally act as informants to the home agent (HA) and the correspondent node (CN) regarding a mobile node's (MN's) new address when its network attachment point changes. Messages should be protected to avoid different security attacks. In the existing standard, control signalling messages between HA and MN are frequently authenticated with IKEv2 and X.509 certificates via IPSec. These signalling messages between MN and CN are so far protected by an effective but insecure protocol. A protocol that uses Binding Update Route Optimisation has security vulnerabilities that allow redirection of traffic by attackers. This traffic is intercepted and then false binding updates is sent along with packet eavesdrop** and Denial of Service (DoS) that disrupts any communication. Due to lack of ineffective authentication procedures to ascertain the validity of the users or hide the location data of HoA and CoA, security issues mentioned above will occur. This paper presents some of existing protecting control signalling message protocols, as well as some proposed approaches for designing a secure method-based private key IP address between an MN and a CN. Using Private Key Based Binding Update (PKBU), care-of-address (CoA) can thus be protected against False Binding Update (FBU), Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attacks.
△ Less
Submitted 23 December, 2012; v1 submitted 27 June, 2012;
originally announced June 2012.
-
A Survey on Cloud Computing Security
Authors:
Hero Modares,
Rosli Salleh,
Amirhosein Moravejosharieh,
Hassan Keshavarz,
Majid Talebi Shahgoli
Abstract:
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products. The Cloud is a metaphor for the Internet and is a concept for the covered complicated infrastructure; it also depends on…
▽ More
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products. The Cloud is a metaphor for the Internet and is a concept for the covered complicated infrastructure; it also depends on sketching in computer network diagrams. In this paper we will focus on concept of cloud computing, cloud deployment models, cloud security challenges encryption and data protection, privacy and security and data management and movement from grid to cloud.
△ Less
Submitted 24 June, 2012;
originally announced June 2012.