Just as mobile or cellular phones evolved from the original wire line telephone system, wireless devices offering Internet Protocol (IP) connectivity are likewise developing. This includes devices such as Personal Digital Assistants (PDA) and handheld computers. This mobile computing should not be confused with portable computing, where computing activities are disrupted when the user changes the computer's point of attachment. Mobile computing continues unbroken as the user or node moves from one link to another. It does this without human intervention and non interactively. The vocabulary normally used to describe this mobile computing is Mobile IP. The original set of Request for Comments (RFC) describing this model is RFCs 2002 through 2006. The purpose of this paper is to discuss the security aspects of Mobile IP.
CITATION STYLE
F., S. (2015). The Security Aspects of Mobile IP. International Journal of Applied Information Systems, 9(5), 31–36. https://doi.org/10.5120/ijais2015451417
Mendeley helps you to discover research relevant for your work.