Design and implementation of mobile IP system with security consideration

被引:0
|
作者
Ishiyama, M [1 ]
Inoue, A [1 ]
Fukumoto, A [1 ]
Okamoto, T [1 ]
机构
[1] Toshiba Corp, Ctr Res & Dev, Commun & Informat Syst Res Lab, Saiwai Ku, Kawasaki, Kanagawa 210, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the commercial use of the Internet is becoming common and the demand for mobile computing over the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out of the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating lp packets. The current implementation status and the performance evaluation are also reported.
引用
收藏
页码:238 / 253
页数:16
相关论文
共 50 条
  • [21] Security concepts and implementation in the Ara mobile agent system
    Peine, H
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 236 - 242
  • [22] Secure mobile IP using IP security primitives
    Inoue, A
    Ishiyama, M
    Fukumoto, A
    Okamoto, T
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 235 - 241
  • [23] Secure mobile IP using IP security primitives
    Inoue, A.
    Ishiyama, M.
    Fukumoto, A.
    Okamoto, T.
    Journal of Engineering and Applied Science, 1997, : 235 - 241
  • [24] Design and implementation of security system based on immune system
    Nishiyama, H
    Mizoguchi, F
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 234 - 248
  • [25] Design and Implementation of Security Camera Control Application for Mobile Phones
    Kato, Takeshi
    Osano, Tomoyuki
    Ishikawa, Norihiro
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 555 - 559
  • [26] Design and Implementation of Indoor and Outdoor Security Patrol Mobile Robot
    Wang, Yu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 19 - 25
  • [27] DESIGN AND IMPLEMENTATION OF THE ACTIVE IMAGE IP MULTICAST SYSTEM
    Niu, Yan
    Du, Jiangyi
    Chen, Yongchao
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 285 - 290
  • [28] Design and Implementation of IP Network Traffic Monitoring System
    Liu Mingbo
    Sun Wenjie
    Zhao Qianhong
    Tian Zhaoping
    2016 15TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN), 2016,
  • [29] IP Camera Based Network Video Surveillance Mobile Security System
    Chen, Long
    Chen, Shuan
    He, Yuqing
    Wei, Jianguo
    Dang, Jianwu
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 1505 - +
  • [30] Design and implementation of security enhanced system for oracle
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    Beijing Youdian Daxue Xuebao, 2006, 5 (84-87):