scispace - formally typeset
Proceedings ArticleDOI

Towards secure mobility support for IP networks

TLDR
This paper analyses the most prominent current approaches for improving the functionality of Mobile IP from a security point of view, focussing on the criteria of efficiency, scalability, transparency, and manageability which are crucial for application in real world networks.
Abstract
The upcoming protocol architecture for mobile communications in the Internet, Mobile IP, inhibits various potential vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. This paper analyses the most prominent current approaches for improving the functionality of Mobile IP from a security point of view, focussing on the criteria of efficiency, scalability, transparency, and manageability which are crucial for application in real world networks. The three big topics covered are authentication and key management, confidentiality and integrity, and efficient micro-mobility support. The paper concludes with an outlook to ongoing research efforts addressing the problems identified before.

read more

Citations
More filters
Patent

Method and apparatus for providing mobile and other intermittent connectivity in a computing environment

TL;DR: In this article, a Mobility Management Server coupled to the mobile network maintains the state of any number of mobile end systems and handles the complex session management required to maintain persistent connections to the network and to other peer processes.
Patent

Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments

TL;DR: In this paper, the authors proposed a method and apparatus for enabling secure connectivity using standards-based Virtual Private Network (VPN) IPSEC algorithms in a mobile and intermittently connected computing environment enhance the current standards based algorithms by allowing migratory devices to automatically establish security sessions as the mobile end system roams across homogeneous or heterogeneous networks while maintaining network application session.
Journal ArticleDOI

Host mobility for IP networks: a comparison

TL;DR: Three alternatives for providing host mobility managment in IP-based networks are described and compared, contrasting the different performance, security, deployment, scalability, and robustness properties of each approach.
Proceedings ArticleDOI

Experience with the host identity protocol for secure host mobility and multihoming

TL;DR: This paper reports on the experience with implementing HIP and experimenting with it as a mobility management and host multihoming solution, and describes the approach for implementing HIP as an extension to Linux and FreeS/WAN IPsec, including the use and extension of standard APIs.
Book ChapterDOI

Re-thinking Security in IP Based Micro-Mobility

TL;DR: This paper presents a secure micro-mobility architecture that scales well between administrative domains, which are already using different kind of network access authentication techniques, and establishes simultaneously a trust relationship between a mobile node and an anchor point, and updates address bindings at the anchor point and at a peer node in a secure way.
References
More filters
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).

HMAC: Keyed-Hashing for Message Authentication

TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.

IP Mobility Support

TL;DR: This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet.
Journal ArticleDOI

A security architecture for the Internet protocol

TL;DR: The design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer, which includes a modular key management protocol, called MKMP, is presented.