منابع مشابه
Authentication for Mobile IPv6
We present a protocol for authenticating Mobile IPv6 connections, addressing requirements established in the relevant Internet Draft [2]. The protocol imposes minimal computational requirements on mobile nodes, uses as few messages as possible, and may be adapted to resist denial of service attacks. Our protocol has two parts, an initialization phase and an update phase. The initialization phas...
متن کاملQoS in Mobile IPv6
As we know, there are two types of Internet Quality of Service (QoS): Intergrated Services (IntServ) and differentiated Services (DiffServ). They are designed in the context of a static environments (fixed hosts and networks) and as a result, these schemes are not fully adapted to mobile environments, especially when Mobile IP is used as the mobility management protocol. In this paper a new two...
متن کاملImplementing Mobile IPv6 for Multimedia
Recent trends show an increasing proportion of portable computing devices in the market today, ranging from laptop PC’s to machines the size of a credit card. Most of these devices have the ability to internetwork with other machines over a variety of both wired and wireless media, and dynamically change between these media. If such devices wish persistent connectivity over such a range of netw...
متن کاملReserved IPv6 Interface Identifier for Proxy Mobile IPv6
Proxy Mobile IPv6 (RFC 5213) requires that all mobile access gateways use a fixed link-local address and a fixed link-layer address on any of their access links that they share with mobile nodes. This requirement was intended to ensure that a mobile node does not detect any change with respect to its Layer 3 attachment, even after it roams from one mobile access gateway to another. In the absen...
متن کاملMobile IPv6 Security
This paper presents a case study of security protocol design: authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protocol design. The goal is to solve any new security issues caused by the introduction of mobility without requiring any new security infrastructure.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.10.312