Security policy for deducting unauthorized IP based mobile host inside the network

被引:0
|
作者
Sanjeevi, V. K. [1 ]
Veluchandhar, K. [2 ]
Sakthivel, S. [3 ]
Supriya, M. [3 ]
机构
[1] BSNL, Tiruchirappalli, India
[2] St Josephs Coll Autonomous, Dept Comp Sci, Tiruchirappalli, Tamil Nadu, India
[3] Wipro Info Tech, Bangalore, Karnataka, India
关键词
mobile security; IP based mobile hosts; mobile hacking; security policy; mobile IP security problems;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The technology evaluation of mobile management system has integrated with significant improvement in mobile computing. The requirements for mobile security are more important when we are accessing the sensitive data from the database. Concurrency control ensures that individual users meet consistent states of the mobile databases with security. But in the IP based mobile network the relay of data is not continuous and also the connection may lose at any time. The IP alone is not suitable for identifying the mobile host inside the network. In this paper, it is proposed a model to enhance the performance of mobile security for IP based mobile host.
引用
收藏
页码:177 / +
页数:3
相关论文
共 50 条
  • [31] RETRACTED: PKI and secret key based mobile IP security (Retracted Article)
    Hu, Dong
    Zhou, Dong
    Li, Ping
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1605 - +
  • [32] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15
  • [33] Network security considerations in TCP/IP-based manufacturing automation
    DePriest, MS
    [J]. ISA TRANSACTIONS, 1997, 36 (01) : 37 - 48
  • [34] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [35] IP Based Security Architecture of Virtual Network in Cloud Computing System
    Yang, Jong-Sung
    Choi, Hyoung-Kee
    [J]. 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 709 - 715
  • [36] RESEARCH ON MODELING FOR NETWORK SECURITY POLICY CONFLICTION BASED ON NETWORK TOPOLOGY
    Li, Liang
    Wu, Shizhou
    Huang, Lisheng
    Wang, Wenyong
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 36 - 41
  • [37] Effective reporting (ER) for mobile host-based security and forensics
    Jacoby, Grant A.
    Ransbottom, J. Scot
    [J]. 2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 269 - 274
  • [38] A mobile agent and policy based network management architecture
    Shi, YL
    Gao, DY
    Pan, J
    Shen, PB
    [J]. ICCIMA 2003: FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2003, : 177 - 181
  • [39] Proposal on IMS-based Full IP integrated Mobile Network
    Kusunose, Kenya
    Nakao, Masateru
    Kuroiwa, Takahiro
    Sawada, Masahiro
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [40] The Realization of TCP Enhancement Technology in Mobile Wireless Network IP Based
    Dai, Jianmei
    Geng, Huafang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 102 - 105