Security policy for deducting unauthorized IP based mobile host inside the network

被引:0
|
作者
Sanjeevi, V. K. [1 ]
Veluchandhar, K. [2 ]
Sakthivel, S. [3 ]
Supriya, M. [3 ]
机构
[1] BSNL, Tiruchirappalli, India
[2] St Josephs Coll Autonomous, Dept Comp Sci, Tiruchirappalli, Tamil Nadu, India
[3] Wipro Info Tech, Bangalore, Karnataka, India
关键词
mobile security; IP based mobile hosts; mobile hacking; security policy; mobile IP security problems;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The technology evaluation of mobile management system has integrated with significant improvement in mobile computing. The requirements for mobile security are more important when we are accessing the sensitive data from the database. Concurrency control ensures that individual users meet consistent states of the mobile databases with security. But in the IP based mobile network the relay of data is not continuous and also the connection may lose at any time. The IP alone is not suitable for identifying the mobile host inside the network. In this paper, it is proposed a model to enhance the performance of mobile security for IP based mobile host.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [21] A Security Framework for Mobile Network based on Security Services and Trusted Terminals
    Xue Ming-fu
    Hu Ai-qun
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [22] Location management and multimedia communication service based on mobile IP and cellular IP network
    Chiang, JS
    Wang, YH
    Tsai, CH
    Hsu, CP
    [J]. AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 223 - 226
  • [23] An intelligent mobile IP routing algorithm based on the active network
    Fan Xiumei
    Guo Xu
    Wang Liping
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 2, 2009, : 253 - 258
  • [24] Policy-based network management in an integrated mobile network
    Oliveira, JL
    Gonçalves, P
    Dziunikowski, W
    Wszolek, J
    Rasmussen, S
    Lopes, RP
    Roque, V
    [J]. TELECOMMUNICATIONS 2005, PROCEEDINGS, 2005, : 59 - 64
  • [25] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [26] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [27] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [28] An Automata-based Security Policy Translation for Network Security Functions
    Yang, Jinhyuk
    Jeong, Jaehoon
    [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 268 - 272
  • [29] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [30] Fault-tolerant mobile communication network based on IEEE 802.11 and Mobile IP
    Morita, Y
    Miyazaki, M
    Higaki, H
    [J]. PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, : 972 - 978