منابع مشابه
Secure Mobile IP Communication
This paper describes a solution called Secure Mobile IP (SecMIP) to provide mobile IP users secure access to their company’s firewall protected virtual private network. The solution requires neither introducing new protocols nor to insert or modify network components. It only requires a slight adaptation of the end system communication software in order to adapt Mobile IP and IP Security protoc...
متن کاملSecure Voice-over-IP
Voice-over-IP (VoIP) is one of the main applications or services, which dramatically increased the spread and usage of the Internet. VoIP describes the transmission and reception of voice and video data over networks that use the “internet protocol” (IP) as transport protocol. With the use of VoIP within company networks (intranet) investors hope to reduce the expenses for infrastructure and ma...
متن کاملSecure Mobile IP with HIP Style Handshaking and Readdressing for public-key based IP network
Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management an...
متن کاملSelecting an ATM or IP Security Solution to Secure an IP over ATM Virtual Private Network
In 1999, the ATM Forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP) network by offering data confidentiality, partners au...
متن کاملAn IP Traceback Model for Network Forensics
Network forensics deals with capture, recording, analysis and investigation of network traffic to traceback the attackers. Its ultimate goal is to provide sufficient evidence to allow the perpetrator to be prosecuted. IP traceback is an important aspect in the investigation process where the real attacker is identified by tracking source address of the attack packets. In this paper we classify ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computational Methods in Science and Technology
سال: 2013
ISSN: 1505-0602
DOI: 10.12921/cmst.2013.19.4.209-216