Skip to main content

Design and implementation of mobile IP system with security consideration

  • Session B-3: Mobile Computing
  • Conference paper
  • First Online:
  • 119 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1368))

Abstract

As the commercial use of the Internet is becoming common and the demand for mobile computing over the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primitives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out of the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation are also reported.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Perkins. IP Mobility Support. RFC 2002, October 1996.

    Google Scholar 

  2. C. Perkins. IP Encapsulation within IP. RFC 2003, October 1996.

    Google Scholar 

  3. R. Atkinson. Security Architecture for the Internet Protocol. RFC 1825, August 1995.

    Google Scholar 

  4. R. Atkinson. IP Authentication Header. RFC 1826, August 1995.

    Google Scholar 

  5. R. Atkinson. IP Encapsulating Payload. RFC 1827, August 1995

    Google Scholar 

  6. A. Aziz, T. Markson, H. Prafullchandra. Simple Key-Management For Internet Protocols (SKIP), (I-D draft-ietf-ipsec-skip-07.txt), August 14, 1996

    Google Scholar 

  7. D. Maughan, M. Schertler, M. Schneider, J. Turner. Internet Security Association and Key Management Protocol (ISAKMP), (I-D draft-ietf-ipsec-isakmp-08.txt), July 26, 1997

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yoshifumi Masunaga Takuya Katayama Michiharu Tsukamoto

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ishiyama, M., Inoue, A., Fukumoto, A., Okamoto, T. (1998). Design and implementation of mobile IP system with security consideration. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_52

Download citation

  • DOI: https://doi.org/10.1007/3-540-64216-1_52

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64216-9

  • Online ISBN: 978-3-540-69704-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics