Secure Mobile IP Using IP Security Primitives - Enabling Technologies: Infrastructure for Collaborative Enterprises, 1997., Proceedings Sixth IEEE

نویسندگان

  • Atsushi Inoue
  • Masahiro Ishiyama
  • Atsushi Fukumoto
  • Toshio Okamoto
چکیده

As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with I P security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with suficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation is also reported.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Team-Based Design: Collaboration across Time and Space

Rapid advances in mobile computing and wireless communication present an opportunity for fundamental changes in engineering education, particularly for teambased courses in which collaborative learning is the dominant learning mode. This talk describes a collaborative, multi-disciplinary design course and a suite of collaboration tools called Handy Andy, to support team based design. The curren...

متن کامل

IP telephony: mobility and security IP telephony: mobility and security

With the introduction of IP based telephony services, the Internet has started to challenge the traditional PSTN networks as an infrastructure for providing real-time interactive services. This upcoming paradigm shift is not only driven by the desire to provide cost efficient solutions, but by basing the communication on IP we expect that the end-users will experience a greater set of attractiv...

متن کامل

Design and Implementation of Network CryptoGate

As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system: "Network CryptoGate (NCG)", which employs the IETF/Mobile IP and the IETF/IP security on stationary security gateways (NCG servers) and mobile hosts (NC...

متن کامل

Secure, QoS-Enabled Mobility Support for IP-based Networks

The rising number of mobile users, the advent of various radio access technologies, and the increasing importance of IP services over wireless as well as wired networks pose a number of new challenges. While Mobile IP has been designed for mobility management in IP networks, it may result in high latency and signaling overhead during handoff. Thus, advanced mobility mechanisms improving Mobile ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997