Mobile IP security and scalable support for transparent host mobility on the Internet

被引:0
|
作者
Niculescu, Marius-Cristian [1 ,2 ,3 ]
Niculescu, Elena [1 ,2 ,3 ]
Resceanu, Ionut [1 ,2 ,3 ]
机构
[1] Univ Craiova, Dept Mechatron, Al I Cuza St 13, RO-200585 Craiova, Romania
[2] Univ Craiova, Dept Elect, Al I Cuza St 13, RO-200585 Craiova, Romania
[3] Univ Craiova, Dept Instrumentat, Al I Cuza St 13, RO-200585 Craiova, Romania
关键词
mobile IP; security; protocol; networks; key; authentication; foreign agent; home agent;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats. How mobile IP works when the mobile host is away from home its home agent picks up its IP packets, encapsulates them in a new IP packet and forwards them to the foreign agent and intermediate routers are unaware. of the inner IP header
引用
收藏
页码:214 / +
页数:2
相关论文
共 50 条
  • [21] Mobility and security in IP network
    Ringapin, A
    Ben-Othman, J
    Urien, P
    [J]. 13TH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOL 1-5, PROCEEDINGS: SAILING THE WAVES OF THE WIRELESS OCEANS, 2002, : 280 - 284
  • [22] Internet mobility support optimized for client access and its scalable authentication framework
    Sufatrio
    Lam, KY
    [J]. MOBILE DATAT ACCESS, 1999, 1748 : 220 - 229
  • [23] Mobility management in mobile IP
    Medidi, SR
    Golshani, F
    [J]. INTERNET PERFORMANCE AND CONTROL OF NETWORK SYSTEMS III, 2002, 4865 : 234 - 243
  • [24] Mobile IP Network Mobility
    Malekian, Reza
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 430 - 433
  • [25] Security policy for deducting unauthorized IP based mobile host inside the network
    Sanjeevi, V. K.
    Veluchandhar, K.
    Sakthivel, S.
    Supriya, M.
    [J]. ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 177 - +
  • [26] An architecture based on Internet of Things to support mobility and security in medical environments
    Jara, Antonio J.
    Zamora, Miguel A.
    Skarmeta, Antonio F. G.
    [J]. 2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 1060 - 1064
  • [27] Transparent mobile IP: an approach and implementation
    Giovanardi, A
    Mazzini, G
    [J]. GLOBECOM 97 - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, CONFERENCE RECORD, VOLS 1-3, 1997, : 1861 - 1865
  • [28] Design and implementation of Network CryptoGate - IP-layer security and mobility support
    Tsuda, Y
    Ishiyama, M
    Fukumoto, A
    Inoue, A
    [J]. PROCEEDINGS OF THE THIRTY-FIRST HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL VII: SOFTWARE TECHNOLOGY TRACK, 1998, : 681 - 690
  • [29] Transparent and scalable terminal mobility for vehicular networks
    Carneiro, Gustavo
    Fortuna, Pedro
    Dias, Jaime
    Ricardo, Manuel
    [J]. COMPUTER NETWORKS, 2012, 56 (02) : 577 - 597
  • [30] Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks
    Jung, Younchan
    Peradilla, Marnel
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2011, 13 (06) : 583 - 590