Security policy for deducting unauthorized IP based mobile host inside the network

被引:0
|
作者
Sanjeevi, V. K. [1 ]
Veluchandhar, K. [2 ]
Sakthivel, S. [3 ]
Supriya, M. [3 ]
机构
[1] BSNL, Tiruchirappalli, India
[2] St Josephs Coll Autonomous, Dept Comp Sci, Tiruchirappalli, Tamil Nadu, India
[3] Wipro Info Tech, Bangalore, Karnataka, India
关键词
mobile security; IP based mobile hosts; mobile hacking; security policy; mobile IP security problems;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The technology evaluation of mobile management system has integrated with significant improvement in mobile computing. The requirements for mobile security are more important when we are accessing the sensitive data from the database. Concurrency control ensures that individual users meet consistent states of the mobile databases with security. But in the IP based mobile network the relay of data is not continuous and also the connection may lose at any time. The IP alone is not suitable for identifying the mobile host inside the network. In this paper, it is proposed a model to enhance the performance of mobile security for IP based mobile host.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [1] Security research on mobile IP network handover
    Hu, D
    Zhou, D
    [J]. International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 80 - 83
  • [2] IP Camera Based Network Video Surveillance Mobile Security System
    Chen, Long
    Chen, Shuan
    He, Yuqing
    Wei, Jianguo
    Dang, Jianwu
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 1505 - +
  • [3] A ticket-based AAA security mechanism in mobile IP network
    Park, JM
    Bae, EH
    Pyeon, HJ
    Chae, K
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 210 - 219
  • [4] The research on policy-based registration mechanism of mobile terminals in mobile IP network
    Wei Da
    Liu Yan-Heng
    Li A-Li
    [J]. COMPUTATIONAL METHODS, PTS 1 AND 2, 2006, : 1153 - +
  • [5] Policy based access router selections and context transfers in mobile IP network
    Gopal, R
    Li, M
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 3 - 14
  • [6] Reliable Security Policy in Mobile Distributed Network
    Suganthi, Bhuvana D.
    Manjuath, R.
    Aravindan, A.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786
  • [7] Mobile IP security and scalable support for transparent host mobility on the Internet
    Niculescu, Marius-Cristian
    Niculescu, Elena
    Resceanu, Ionut
    [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 214 - +
  • [8] Security scenarios within IP-based Mobile Multimedia Metropolitan Area Network
    Zhang, L
    Lambertsen, G
    Yamada, T
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1522 - 1526
  • [9] COMPARING 4 IP BASED MOBILE HOST PROTOCOLS
    MYLES, A
    SKELLERN, D
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1993, 26 (03): : 349 - 355
  • [10] Network prediction in a policy-based IP network
    Beigi, M
    Verma, D
    [J]. GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2522 - 2526