Describe one security measure against reverse tunneling, Computer Networking

Assignment Help:

Question:

a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use a routing header in the reverse direction? Why not use destination option in both ways?

b) In the basic Return Routability mechanism, the mobile node reverse-tunnels the HoTI message to the home agent, which in turn forwards the packet to the correspondent. When the IPv4 address is co-located with the mobile node, the mobile node can reverse-tunnel the HoTI message using IPv4 addresses.

i. What implications does this have on the security association and signalling?

ii. What are the savings, if any?

c) Explicit the following statement: "The return routability procedure provides an address ownership proof mechanism."

d) Assuming that IP routing works on the Internet today and we send two different secrets along two different routing paths, why a proof that combines the two secrets sufficient for binding one address to another?

e) Reverse tunneling may be used in certain cases, such as when a network does not allow outgoing datagrams with a foreign source IP address, when enabled, rather than sending datagrams directly, the mobile node tunnels all transmissions back to the home agent, which sends them on the Internet. Consider MIP in a VPN scenario.

i. Explain how reverse tunneling could be risky if appropriate security measures are absent.

ii. Describe one security measure against reverse tunneling.

f) Assuming you are using authentication schemes for communications between

(i) a MN and a HA, (ii) a MN and a FA. Which one of (i) and (ii) is less secure?


Related Discussions:- Describe one security measure against reverse tunneling

Explain about the integrating intranet, Explain about the Integrating Intra...

Explain about the Integrating Intranet These Intranets are designed to replace the complexity of in-house communications and processing systems that large organisations ofte

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Determine the characteristics of thicknet, Thicknet Characteristics ...

Thicknet Characteristics It Supports transmission rates up to 10 Mbps in Baseband mode Less expensive in comparison of fiber-optic cable however more expensive than ot

Hub - network layer and routing , Hub A hub  is a  small box that  con...

Hub A hub  is a  small box that  connects  individual devices on network  so that  these devices  can  communicate  with each  other. Hub  is an inexpensive device. It is comm

Determine the signal bandwidth and the amplitudes, 1. A low voltage digital...

1. A low voltage digital device has a low state of 0 V and a high state of 1.8 V. It generates a signal train of high pulses at a rate of 1 MHz, these pulses having a 10 ns width a

Mime the multipurpose internet mail extensions, MIME The Multipurpose Inter...

MIME The Multipurpose Internet Mail Extensions While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for

Transmission control protocol, Transmission Control Protocol (TCP) TCP ...

Transmission Control Protocol (TCP) TCP makes the Internet reliable. TCP solves several problems which can occur in a packet switching system. TCP provide the given facilities:

What is bandwidth, Question 1 What is bandwidth?                         >...

Question 1 What is bandwidth?                         >>What is the bandwidth of                            a) Telephone signal                            b) Commercial radio broa

Applications of networks, Q. Applications of networks? End systems (h...

Q. Applications of networks? End systems (hosts): - Run application programs - Example email, Web - At -edge of network Client/server model - Client host

Cells vs packets, ATM designers select cells over packets because of the fo...

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd