Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobil...Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobile IP se-curity architecture is presented in the article. This architecture combines IPSec and some other secure measures withmobile IP so as to give mobile IP stronger security. In the article this architecture is discussed in detail and a methodis proposed to traverse firewall using IKE.展开更多
One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,a...One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.展开更多
This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in...This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in mobile ip protocol,and gives the methods of mobile multicast and multicast agent to solve mobile multicast problem, then compares delivery cost of multicast and delivery delay of multicast packets as well as disruption of multicast service due to mobility in four kinds of methods of mobile multicast.展开更多
Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this ...Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.展开更多
给出了一种将移动IP技术融入无线局域网的方案,该方案基于IEEE802.11协议,采用了专为移动网络设计的Diameter Mobile IP应用协议来实现认证、授权和计费管理,在实现了跨不同管理区域的漫游功能的同时,提供了相互认证以及数据的完整性和...给出了一种将移动IP技术融入无线局域网的方案,该方案基于IEEE802.11协议,采用了专为移动网络设计的Diameter Mobile IP应用协议来实现认证、授权和计费管理,在实现了跨不同管理区域的漫游功能的同时,提供了相互认证以及数据的完整性和保密性,同时尽量少影响现有的IEEE802.11系统。展开更多
文摘Mobile IP is one of the key technologies to implement mobile computing. But its security still needs furtherresearch. After an introduction to mobile IP, IPSec and the threat to mobile IP security,an IPSec-based mobile IP se-curity architecture is presented in the article. This architecture combines IPSec and some other secure measures withmobile IP so as to give mobile IP stronger security. In the article this architecture is discussed in detail and a methodis proposed to traverse firewall using IKE.
文摘One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.
文摘This paper discusses the method of mobile multicast based on mobile IP protocol proposed by IETF. At first, the paper analyzes the methods of Remote subscription and Home subscription, points out the latent problem in mobile ip protocol,and gives the methods of mobile multicast and multicast agent to solve mobile multicast problem, then compares delivery cost of multicast and delivery delay of multicast packets as well as disruption of multicast service due to mobility in four kinds of methods of mobile multicast.
文摘Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.
文摘给出了一种将移动IP技术融入无线局域网的方案,该方案基于IEEE802.11协议,采用了专为移动网络设计的Diameter Mobile IP应用协议来实现认证、授权和计费管理,在实现了跨不同管理区域的漫游功能的同时,提供了相互认证以及数据的完整性和保密性,同时尽量少影响现有的IEEE802.11系统。