Design and implementation of mobile IP system with security consideration

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the commercial use of the Internet is becoming common and the demand for mobile computing over the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out of the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation are also reported.

Cite

CITATION STYLE

APA

Ishiyama, M., Inoue, A., Fukumoto, A., & Okamoto, T. (1998). Design and implementation of mobile IP system with security consideration. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1368, pp. 238–253). Springer Verlag. https://doi.org/10.1007/3-540-64216-1_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free