IPsec in Mobile IP: A Survey

نویسنده

  • Riaz A Khan
چکیده

The increasing demand of mobile gadgets like mobile phones, mini PCs, laptops and tablets etc. has made the Mobile IP (MIP) one of the current research issues of IETF. Mobile IP as the name suggests; protocol which supports mobility of IP-addresses or we can say the mobility of different IP-nodes. Mobile IP has become an important technical tool in the establishment of enveloping computing environment. As people carry smart phones with them all the time and they want to remain connected with the network even when they make a shift from one network to another without losing information. Mobile IP provides the solution for mobility from one home network to foreign network (visited network by mobile node). Mobile IP and its extensions have provided many solutions for mobility with minimum handover latency but still security remains an issue. While moving from one network to another various security problems can arise and can be experienced by the mobile users. This paper provides a study of Mobile IP, security issues in Mobile IP and solutions provided by IPsec suit in Mobile IP. IPsec provides the security to the transport layer and IP layer security. Looking at the available bandwidth of today’s mobile networks as Wireless LAN, GPRS, 3G/4G or even Bluetooth, the estimated performance of Secure MIP is acceptable for the moment. But security has its price as after studying the different approaches for secure MIP we realized that IPsec has 80% impact on the Mobile IP communication. This article mainly focuses on Mobile IPv6 Security, potential threats to MIP, How IPsec works and different security considerations used to secure MIP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated IPSEC and Mobile-IP for FreeBSD

Recently the Layer 2 802.11 link-layer security mechanism called WEP has been shown to be awed. In this paper we present a combined layer 3 Mobile-IP and IPSEC routing architecture that is superior to WEP. We overview possible routing security architectures and then present two integrated IPv4 Mobile-IP/IPSEC routing dae-mon architectures that we refer to as "closely-coupled" and "loosely-coupl...

متن کامل

An IPSec-Based Key Management Algorithm for Mobile IP Networks

The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authen...

متن کامل

Access of Mobile IP Users to Firewall Protected VPNs

The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation based on adaptation of standard protocols (IPSec and Mobile IP) and initial performance results are discussed.

متن کامل

RFC 6618 TLS - Based MIPv

Mobile IPv6 signaling between a Mobile Node (MN) and its Home Agent (HA) is secured using IPsec. The security association (SA) between an MN and the HA is established using Internet Key Exchange Protocol (IKE) version 1 or 2. The security model specified for Mobile IPv6, which relies on IKE/IPsec, requires interaction between the Mobile IPv6 protocol component and the IKE/IPsec module of the IP...

متن کامل

Mobile Multilayer IPsec protocol

A mobile user moves around and switches between wireless cells, subnets and domains, it needs to maintain the session continuity. At the same time security of signaling and transport media should not be compromised. A multi-layer security framework involving user authentication, packet based encryption and access control mechanism can provide the desired level of security to the mobile users. S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013