Securing Mobile IP Communications Using MOBIKE Protocol

被引:0
|
作者
Karbasioun, Mohammad Mahdi [1 ]
Berenjkub, Mehdi [2 ]
Taji, Bahareh [2 ]
机构
[1] Islamic Azad Univ, KhomeiniShahr Branch, Tehran, Iran
[2] Isfahan Univ Technol, Esfahan, Iran
关键词
Mobile IP; IPsec; MOBIKE; Authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile IP is used to manage the mobility of the internet mobile users, and to keep their connectivity while they move from place to place. The security of mobile IP considering can be divided into two aspects, first in registration process, second, when connected parties exchange data with each other. In this article, after a brief study on the existing approaches used for securing mobile IP connections and after pointing to their problems, a new method will be introduced. This method is based on using IPsec security mechanism in conjunction with MOBIKE protocol. It will be pointed out that by using this proposed approach, the security of mobile IP connections will be achieved with respect to both two mentioned aspects. And also it is shown that most of the problems of existing approaches are eliminated in this method.
引用
收藏
页码:128 / +
页数:2
相关论文
共 50 条
  • [1] Securing mobile IP enabled laptop
    Wiangsripanawan, R
    Safavi-Naini, R
    Susilo, W
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 693 - 698
  • [2] Optimization of the wireless communications in VPNs using mobile IP
    Dep. of Mechatronics and Electronics and Instrumentation, University of Craiova, Al. I. Cuza Street, No. 13, Craiova RO-200585, Romania
    WSEAS Trans. Commun., 2006, 12 (2161-2166):
  • [3] Using Aiders for Securing Communications of Resource-Challenged Mobile Devices
    Rashwan, A. M.
    Taha, A-E M.
    Hassanein, Hossam S.
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [4] Simulating the mobile-IP protocol using Wave
    Vuong, S
    Mathy, L
    FIRST ANNUAL CONFERENCE ON EMERGING TECHNOLOGIES AND APPLICATIONS IN COMMUNICATIONS, PROCEEDINGS, 1996, : 200 - 203
  • [5] Enhanced mobile IP protocol
    Esmat, B
    Mikhail, MN
    El Kadi, A
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2000, 1818 : 158 - 173
  • [6] SECURING INTERNET PROTOCOL (IP) STORAGE: A CASE STUDY
    Somayaji, Siva Rama Krishnan
    Murty, Ch. A. S.
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 190 - +
  • [7] A New Lightweight Key Exchange Protocol With Provable Security for Securing Cloud-Assisted Mobile Communications
    Liu, Jun
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 772 - 777
  • [8] A Token-based Protocol for Securing MQTT Communications
    Calabretta, Marco
    Pecori, Riccardo
    Veltri, Luca
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 246 - 251
  • [9] Securing Session Initiation Protocol in Voice over IP Domain
    Alsmairat, Iyad
    Shankaran, Rajan
    Orgun, Mehmet
    Dutkiewicz, Eryk
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 78 - 83
  • [10] Evaluation of mobile IP fast authentication protocol compared to hierarchical mobile IP
    Diab, A
    Mitschele-Thiel, A
    Böringer, R
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 9 - 16