Secure and Mobile Networking

نویسندگان

  • Vipul Gupta
  • Gabriel Montenegro
چکیده

The IETF Mobile IP protocol is a significant step towards enabling nomadic Internet users. It allows a mobile node to maintain and use the same IP address even as it changes its point of attachment to the Internet. Mobility implies higher security risks than static operation. Portable devices may be stolen or their traffic may, at times, pass through links with questionable security characteristics. Most commercial organizations use some combination of source-filtering routers, sophisticated firewalls, and private address spaces to protect their network from unauthorized users. The basic Mobile IP protocol fails in the presence of these mechanisms even for authorized users. This paper describes enhancements that enable Mobile IP operation in such environments, i.e., they allow a mobile user, out on a public portion of the Internet, to maintain a secure virtual presence within his firewall-protected office network. This constitutes what we call a Mobile Virtual Private Network (MVPN).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Relationship between Dependence on Mobile Social Networking and Academic Performance of Students (Case study: Second Grade Male High School Students of Tabriz City)

This research aims at the relationship between dependence on mobile social networking and academic performance of second-grade male high school students in Tabriz City. This research is an applied research based on descriptive-correlational methodology. Statistical population of this research includes all second-grade male high school students in the academic year of 2016-2017 whose volume is 2...

متن کامل

A comparative study on the addiction to mobile social networking and academic stress in procrastinating and non-procrastinating student

Introduction: Prevention of academic failure and subsequent improvement of educational quality and academic achievement of students are important in considering the variables related to academic achievement. One of the psychological characteristics that affects the academic achievement of the learners is procrastination. Educational neglect is affected by several factors. In this study, the stu...

متن کامل

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks

This paper presents auto-networking technologies for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address autoconfiguration, IPv6 multicast address allocation, secure multicast DNS, and service discovery. These technologies are based on IPv6’s inherent autoconfiguration facility, which can provide ad hoc users with automatic networking in IPv6 ad hoc env...

متن کامل

The impact of information technology on health

Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...

متن کامل

An Architecture for Secure Wireless Networking*

As wireless networks are rapidly deployed, the security of wireless environments will be mandatory. Considering the inherent security limitations of Ad Hoc networks, we propose a new architecture: Hierarchical Hybrid networks for secure wireless networking. In such a network, wireless nodes are organized into groups. We present a secure communication scheme to defend against link attacks. Secur...

متن کامل

Secure user authentication based on the trusted platform for mobile devices

In recent years, the use of mobile devices including smartphones has increased significantly all over the world, and e-commerce using smartphones has also greatly increased. Furthermore, many people are using their smartphones to carry out certain aspects of their work according to the BYOD trend. Therefore, it is extremely important that mobile device users are authenticated securely by remote...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • MONET

دوره 3  شماره 

صفحات  -

تاریخ انتشار 1998