Secure Mobile IP Using IP Security Primitives - Enabling Technologies: Infrastructure for Collaborative Enterprises, 1997., Proceedings Sixth IEEE
نویسندگان
چکیده
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with I P security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with suficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation is also reported.
منابع مشابه
Team-Based Design: Collaboration across Time and Space
Rapid advances in mobile computing and wireless communication present an opportunity for fundamental changes in engineering education, particularly for teambased courses in which collaborative learning is the dominant learning mode. This talk describes a collaborative, multi-disciplinary design course and a suite of collaboration tools called Handy Andy, to support team based design. The curren...
متن کاملIP telephony: mobility and security IP telephony: mobility and security
With the introduction of IP based telephony services, the Internet has started to challenge the traditional PSTN networks as an infrastructure for providing real-time interactive services. This upcoming paradigm shift is not only driven by the desire to provide cost efficient solutions, but by basing the communication on IP we expect that the end-users will experience a greater set of attractiv...
متن کاملDesign and Implementation of Network CryptoGate
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system: "Network CryptoGate (NCG)", which employs the IETF/Mobile IP and the IETF/IP security on stationary security gateways (NCG servers) and mobile hosts (NC...
متن کاملSecure, QoS-Enabled Mobility Support for IP-based Networks
The rising number of mobile users, the advent of various radio access technologies, and the increasing importance of IP services over wireless as well as wired networks pose a number of new challenges. While Mobile IP has been designed for mobility management in IP networks, it may result in high latency and signaling overhead during handoff. Thus, advanced mobility mechanisms improving Mobile ...
متن کامل