Describe one security measure against reverse tunneling, Computer Networking

Assignment Help:

Question:

a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use a routing header in the reverse direction? Why not use destination option in both ways?

b) In the basic Return Routability mechanism, the mobile node reverse-tunnels the HoTI message to the home agent, which in turn forwards the packet to the correspondent. When the IPv4 address is co-located with the mobile node, the mobile node can reverse-tunnel the HoTI message using IPv4 addresses.

i. What implications does this have on the security association and signalling?

ii. What are the savings, if any?

c) Explicit the following statement: "The return routability procedure provides an address ownership proof mechanism."

d) Assuming that IP routing works on the Internet today and we send two different secrets along two different routing paths, why a proof that combines the two secrets sufficient for binding one address to another?

e) Reverse tunneling may be used in certain cases, such as when a network does not allow outgoing datagrams with a foreign source IP address, when enabled, rather than sending datagrams directly, the mobile node tunnels all transmissions back to the home agent, which sends them on the Internet. Consider MIP in a VPN scenario.

i. Explain how reverse tunneling could be risky if appropriate security measures are absent.

ii. Describe one security measure against reverse tunneling.

f) Assuming you are using authentication schemes for communications between

(i) a MN and a HA, (ii) a MN and a FA. Which one of (i) and (ii) is less secure?


Related Discussions:- Describe one security measure against reverse tunneling

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

When would we use isdn, We use IDSN supports high speed voice, data and vid...

We use IDSN supports high speed voice, data and video and is a good choice for many small businesses.

Illustrate data-link layer in osi layers model, Q. Illustrate Data-Link Lay...

Q. Illustrate Data-Link Layer in osi layers model? Data-Link Layer: This layer takes the data messages or frames from the Network Layer and gives for their actual transmissio

Computer Information Systems, I am taking a computer information systems cl...

I am taking a computer information systems class for which I have an online test I need done. It will not let me attach all the material that is on the test but someone well versed

Calculate the efficiency of stop and wait arq, (i)  Suppose that frames are...

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in

Receive window - transport layer, Receive Window This  field  defin...

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd