Analysis of Security and Privacy in Mobile IP

نویسندگان

  • Andreas Fasbender
  • Dogan Kesdogan
  • Olaf Kubitz
چکیده

in: 4th International Conference on Telecommunication Systems, Modelling and Analysis, März 21 24, 1996, Nashville, TN, USA Analysis of Security and Privacy in Mobile IP Andreas Fasbender, Dogan Kesdogan 1 and Olaf Kubitz Lehrstuhl für Informatik 4 (Communication Systems) RWTH Aachen (Aachen University of Technology) 52056 Aachen, Germany Phone: +49 (241) 80-21401, Fax: +49 (241) 8888-220 E-mail: {andreas, dogan, kubitz}@i4.informatik.rwth-aachen.de

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

Variable and Scalable Security : Protection of Location Information in Mobile

| The amount of mobile and nomadic computing is expected to increase dramatically in the near future. Hand in hand with this ubiquitous mobile computing security and privacy problems show up, which have not been dealt with suf-cently up to now. The main problems are traac analysis and the easy access to location information, for example in the popular Internet just by looking at the address hea...

متن کامل

Practical Solution for Location Privacy in Mobile IPv6

Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using resources in the foreign domain network. MIP is expected to be the core infrastructure of future mobile communication, but certain level of security services must be provided before the wide deployment of MIP. Security services, such as authentication and access control, have ...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996