A mobile host protocol supporting route optimization and authentication
نویسندگان
چکیده
منابع مشابه
A Mobile Host Protocol Supporting Route Optimization and Authentication
Host mobility is becoming an important issue due to the recent proliferation of notebook and palmtop computers, the development of wireless network interfaces, and the growth in global internetworking. This paper describes the design and implementation of a mobile host protocol, called the Internet Mobile Host Protocol (IMHP), that is compatible with the TCP/IP protocol suite, and allows a mobi...
متن کاملA Location Update Protocol Supporting Route Optimization for Mobile Hosts
Using the Internet as a foundation for wireless networking, there is currently a great deal of interest in providing IP networking support for mobile hosts. As a result of IP's reliance on the entire Internet address for host identiication, most proposals depend on a default route through the mobile host's home address, which makes for unnecessarily long routes. This paper introduces two concep...
متن کاملA Secure Route Optimization Protocol in Mobile IPV6 D.Kavitha
Mobile IPV6 allows a mobile node to talk directly to its peers while retaining the ability to move around and change the currently used IP addresses. This mode of operation is called Route Optimization. In this method , the correspondent node learns a binding between the Mobile nodes permanent home address and its current temporary care-of-address. This introduces several security vulnerabiliti...
متن کاملA new Route Optimization protocol for Mobile IPv6 (ROM)
Mobile IPv6 is the mobility protocol of the IPv6 protocol. The mobility feature in IPv6 is supposed to be default, but still there are obstacles carrying out deployment. Great needs for this new Internet Protocol are security, scalability, efficiency and the lack of IPv4 addresses. Deployment of this long needed new protocol has been delayed partly due to the route optimization problem of mobil...
متن کاملAn Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments
The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Selected Areas in Communications
سال: 1995
ISSN: 0733-8716
DOI: 10.1109/49.391750