Design and implementation of mobile IP system with security consideration
As the commercial use of the Internet is becoming common and the demand for mobile computing over the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out of the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation are also reported.
KeywordsMobile Node Home Agent Foreign Agent Home Network Correspondent Node
Unable to display preview. Download preview PDF.
- 1.C. Perkins. IP Mobility Support. RFC 2002, October 1996.Google Scholar
- 2.C. Perkins. IP Encapsulation within IP. RFC 2003, October 1996.Google Scholar
- 3.R. Atkinson. Security Architecture for the Internet Protocol. RFC 1825, August 1995.Google Scholar
- 4.R. Atkinson. IP Authentication Header. RFC 1826, August 1995.Google Scholar
- 5.R. Atkinson. IP Encapsulating Payload. RFC 1827, August 1995Google Scholar
- 6.A. Aziz, T. Markson, H. Prafullchandra. Simple Key-Management For Internet Protocols (SKIP), (I-D draft-ietf-ipsec-skip-07.txt), August 14, 1996Google Scholar
- 7.D. Maughan, M. Schertler, M. Schneider, J. Turner. Internet Security Association and Key Management Protocol (ISAKMP), (I-D draft-ietf-ipsec-isakmp-08.txt), July 26, 1997Google Scholar