Coupling host mobility and quality of service with security is one of the main issues to be addressed in the next generation wireless systems. The next generation wireless systems evolve towards Internet protocol (IP)-based wireless heterogeneous systems where host mobility and voice over Internet protocol (VoIP) communications become fundamental. There is nowadays a strong need to have continuous network connectivity to voice services.
In wireless heterogeneous networks, mobility management should be provided at a convergent layer. This book focuses on the network layer as the convergent layer to provide mobility. At the network layer, mobility is therefore naturally modelled as changing the routing of datagrams destined for the mobile node (MN) so that they arrive at the new point of attachment. This is the goal of mobile IP [1]: providing a host with the ability to stay connected to the Internet and its services regardless of its location. In this chapter, we focus on mobile IPv6 (MIPv6) [2] and its security features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Perkins, “IP Mobility Support,” RFC3344 IETF, August 2002.
D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775, June 2004.
P. Nikander, J. Arkko, T. Aura, G. Montenegro, and E. nordmark, Mobile IP version 6 Route Optimization Security Design Background,” IETF RFC4225, December 2005.
P. Nikander, J. Arkko, T. Aura, and G. Montenegro, Mobile IP version 6 Route Optimization Security Design,” IEEE Vehicular Technology conference, vol. 3, pp. 2004–2008, 2003.
S. Shin, K. Kobara, and H. Imai, “Leakage-resilient authenticated key establishment protocols,” ASIACRYPT, 2003, pp. 155–172.
H. Fathi, S. Shin, K. Kobara, S.S. Chakraborty, H. Imai, and R. Prasad, “Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Mobile IPv6 in Wireless Overlay Networks, vol. 3, no. 11, pp. 2182–2193, November 2005.
R. Housley and T. Polk, Planning for PKI. Wiley, New York, 2001.
S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.
S. Kent and R. Atkinson, “IP Encapsulating Security Payload (ESP),” RFC 2406, November 1998.
D. Harkins and D. Carrel, “The Internet Key Exchange (IKE),” RFC 2409, November 1998.
D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” RFC 3174, September 2001.
S. Shin, K. Kobara, and H. Imai, “Efficient Leakage-Resilient Authenticated Key Transport Protocol based on RSA,” ACNS 2005. Lecture Note in Computer Science, Springer, Heidelberg, Germany, 2005.
L. Kleinrock, Queuing Systems Vol. I Theory, Wiley, New York, 1975.
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media B.V
About this chapter
Cite this chapter
(2009). Coupling Mobility and Security. In: Voice over IP in Wireless Heterogeneous Networks. Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6631-3_8
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6631-3_8
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6630-6
Online ISBN: 978-1-4020-6631-3
eBook Packages: EngineeringEngineering (R0)