CFP last date
15 January 2025
Call for Paper
February Edition
IJAIS solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 15 January 2025

Submit your paper
Know more
Reseach Article

The Security Aspects of Mobile IP

by Saied F. Alshahrani
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 5
Year of Publication: 2015
Authors: Saied F. Alshahrani
10.5120/ijais2015451417

Saied F. Alshahrani . The Security Aspects of Mobile IP. International Journal of Applied Information Systems. 9, 5 ( August 2015), 31-36. DOI=10.5120/ijais2015451417

@article{ 10.5120/ijais2015451417,
author = { Saied F. Alshahrani },
title = { The Security Aspects of Mobile IP },
journal = { International Journal of Applied Information Systems },
issue_date = { August 2015 },
volume = { 9 },
number = { 5 },
month = { August },
year = { 2015 },
issn = { 2249-0868 },
pages = { 31-36 },
numpages = {9},
url = { https://www.ijais.org/archives/volume9/number5/782-2015451417/ },
doi = { 10.5120/ijais2015451417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:00:17.881875+05:30
%A Saied F. Alshahrani
%T The Security Aspects of Mobile IP
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 9
%N 5
%P 31-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Computing is a Human-Computer Interaction (HCI) by which a computer is expected to be transported during normal usage. Mobile Computing involves mobile communication, mobile hardware and mobile software. Commnication issues comprise ad-hoc and infrastructure networks/frameworks as well communication properties, protocols, data formats, concrete technologies and security aspects. The main objective of this study is to give an overview to Mobile IP in the light of its Introduction, security, header, security tunneling, In-campus network security models, and different sort of assaults and course of action of Mobile IP with security measures and fortification.

References
  1. ”Kent & Atkinson”. ”IP Encapsulating Security Payload” (ESP). RFC 2406, November 1998.
  2. ”Montenegro & Gupta”. ”SKIP Firewall Traversal for Mobile IP” of Sun. RFC 2356, June 1998.
  3. ”Madison & Glenn”. ”The Use of HMAC-MD5-96 within ESP and AH”. RFC 2403.
  4. ”Madjid Nakhjiri & Mahsa Nakhjiri ” AAA and Network Security for Mobile Access - Wiley Publication.
  5. ”D. Solomon”. ”Mobile IP” - The Internet Unplugged. Prentice-Hall, 1997.
  6. ”http://www-europe.cisco.com/univercd/cc/td/doc/product/access/mar_3200/mar_conf/m516secu.htm
  7. Gloria Tuquerres, Marcos Rogério Salvador & Ron Sprenkels ”MOBILE IP: SECURITY & APPLICATION –at the University of Twente, The Netherlands.
  8. ”http://ieeexplore.ieee.org/iel5/7020/18920/00874016.pdf”
  9. http://www.tcpipguide.com/free/t_MobileIPSecurityConsiderations.htm
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Computing (MC) IP HCI Security