Advertisement

Design and implementation of mobile IP system with security consideration

  • Masahiro Ishiyama
  • Atsushi Inoue
  • Atsushi Fukumoto
  • Toshio Okamoto
Session B-3: Mobile Computing
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1368)

Abstract

As the commercial use of the Internet is becoming common and the demand for mobile computing over the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out of the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation are also reported.

Keywords

Mobile Node Home Agent Foreign Agent Home Network Correspondent Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C. Perkins. IP Mobility Support. RFC 2002, October 1996.Google Scholar
  2. 2.
    C. Perkins. IP Encapsulation within IP. RFC 2003, October 1996.Google Scholar
  3. 3.
    R. Atkinson. Security Architecture for the Internet Protocol. RFC 1825, August 1995.Google Scholar
  4. 4.
    R. Atkinson. IP Authentication Header. RFC 1826, August 1995.Google Scholar
  5. 5.
    R. Atkinson. IP Encapsulating Payload. RFC 1827, August 1995Google Scholar
  6. 6.
    A. Aziz, T. Markson, H. Prafullchandra. Simple Key-Management For Internet Protocols (SKIP), (I-D draft-ietf-ipsec-skip-07.txt), August 14, 1996Google Scholar
  7. 7.
    D. Maughan, M. Schertler, M. Schneider, J. Turner. Internet Security Association and Key Management Protocol (ISAKMP), (I-D draft-ietf-ipsec-isakmp-08.txt), July 26, 1997Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Masahiro Ishiyama
    • 1
  • Atsushi Inoue
    • 1
  • Atsushi Fukumoto
    • 1
  • Toshio Okamoto
    • 1
  1. 1.Communication and Information Systems Research Lab. Research and Development CenterToshiba CorporationSaiwai-ku, kawasakiJapan

Personalised recommendations