The Security Aspects of Mobile IP

  • F. S
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Just as mobile or cellular phones evolved from the original wire line telephone system, wireless devices offering Internet Protocol (IP) connectivity are likewise developing. This includes devices such as Personal Digital Assistants (PDA) and handheld computers. This mobile computing should not be confused with portable computing, where computing activities are disrupted when the user changes the computer's point of attachment. Mobile computing continues unbroken as the user or node moves from one link to another. It does this without human intervention and non interactively. The vocabulary normally used to describe this mobile computing is Mobile IP. The original set of Request for Comments (RFC) describing this model is RFCs 2002 through 2006. The purpose of this paper is to discuss the security aspects of Mobile IP.

Cite

CITATION STYLE

APA

F., S. (2015). The Security Aspects of Mobile IP. International Journal of Applied Information Systems, 9(5), 31–36. https://doi.org/10.5120/ijais2015451417

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free