{"title":"与移动节点的DNS动态更新相关的安全问题:调查","authors":"Sadaf Yasmin, M. Yousaf, A. Qayyum","doi":"10.1145/1943628.1943645","DOIUrl":null,"url":null,"abstract":"In today's heterogeneous wireless environment mobile nodes can move across different networks. This movement can cause to change the IP address of the mobile node thus, making it unreachable for other nodes in the network. In order to be available for other nodes, mobile node needs some location management mechanism. DNS dynamic updates have been proposed to be used as location manager for many transport layer mobility management protocols. Although secure dynamic DNS updates are used for location management however, we have found that these secure updates are also susceptible to certain security issues. In this paper, we have highlighted many of these issues and discussed solutions that address these security issues. It has also been found that many of these attacks are interdependent on each other.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security issues related with DNS dynamic updates for mobile nodes: a survey\",\"authors\":\"Sadaf Yasmin, M. Yousaf, A. Qayyum\",\"doi\":\"10.1145/1943628.1943645\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's heterogeneous wireless environment mobile nodes can move across different networks. This movement can cause to change the IP address of the mobile node thus, making it unreachable for other nodes in the network. In order to be available for other nodes, mobile node needs some location management mechanism. DNS dynamic updates have been proposed to be used as location manager for many transport layer mobility management protocols. Although secure dynamic DNS updates are used for location management however, we have found that these secure updates are also susceptible to certain security issues. In this paper, we have highlighted many of these issues and discussed solutions that address these security issues. It has also been found that many of these attacks are interdependent on each other.\",\"PeriodicalId\":434420,\"journal\":{\"name\":\"International Conference on Frontiers of Information Technology\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Frontiers of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1943628.1943645\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1943628.1943645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security issues related with DNS dynamic updates for mobile nodes: a survey
In today's heterogeneous wireless environment mobile nodes can move across different networks. This movement can cause to change the IP address of the mobile node thus, making it unreachable for other nodes in the network. In order to be available for other nodes, mobile node needs some location management mechanism. DNS dynamic updates have been proposed to be used as location manager for many transport layer mobility management protocols. Although secure dynamic DNS updates are used for location management however, we have found that these secure updates are also susceptible to certain security issues. In this paper, we have highlighted many of these issues and discussed solutions that address these security issues. It has also been found that many of these attacks are interdependent on each other.