Skip to main content

Part of the book series: Signals and Communication Technology ((SCT))

Coupling host mobility and quality of service with security is one of the main issues to be addressed in the next generation wireless systems. The next generation wireless systems evolve towards Internet protocol (IP)-based wireless heterogeneous systems where host mobility and voice over Internet protocol (VoIP) communications become fundamental. There is nowadays a strong need to have continuous network connectivity to voice services.

In wireless heterogeneous networks, mobility management should be provided at a convergent layer. This book focuses on the network layer as the convergent layer to provide mobility. At the network layer, mobility is therefore naturally modelled as changing the routing of datagrams destined for the mobile node (MN) so that they arrive at the new point of attachment. This is the goal of mobile IP [1]: providing a host with the ability to stay connected to the Internet and its services regardless of its location. In this chapter, we focus on mobile IPv6 (MIPv6) [2] and its security features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Perkins, “IP Mobility Support,” RFC3344 IETF, August 2002.

    Google Scholar 

  2. D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775, June 2004.

    Google Scholar 

  3. P. Nikander, J. Arkko, T. Aura, G. Montenegro, and E. nordmark, Mobile IP version 6 Route Optimization Security Design Background,” IETF RFC4225, December 2005.

    Google Scholar 

  4. P. Nikander, J. Arkko, T. Aura, and G. Montenegro, Mobile IP version 6 Route Optimization Security Design,” IEEE Vehicular Technology conference, vol. 3, pp. 2004–2008, 2003.

    Google Scholar 

  5. S. Shin, K. Kobara, and H. Imai, “Leakage-resilient authenticated key establishment protocols,” ASIACRYPT, 2003, pp. 155–172.

    Google Scholar 

  6. H. Fathi, S. Shin, K. Kobara, S.S. Chakraborty, H. Imai, and R. Prasad, “Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Mobile IPv6 in Wireless Overlay Networks, vol. 3, no. 11, pp. 2182–2193, November 2005.

    Google Scholar 

  7. R. Housley and T. Polk, Planning for PKI. Wiley, New York, 2001.

    Google Scholar 

  8. S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.

    Google Scholar 

  9. S. Kent and R. Atkinson, “IP Encapsulating Security Payload (ESP),” RFC 2406, November 1998.

    Google Scholar 

  10. D. Harkins and D. Carrel, “The Internet Key Exchange (IKE),” RFC 2409, November 1998.

    Google Scholar 

  11. D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” RFC 3174, September 2001.

    Google Scholar 

  12. S. Shin, K. Kobara, and H. Imai, “Efficient Leakage-Resilient Authenticated Key Transport Protocol based on RSA,” ACNS 2005. Lecture Note in Computer Science, Springer, Heidelberg, Germany, 2005.

    Google Scholar 

  13. L. Kleinrock, Queuing Systems Vol. I Theory, Wiley, New York, 1975.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V

About this chapter

Cite this chapter

(2009). Coupling Mobility and Security. In: Voice over IP in Wireless Heterogeneous Networks. Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6631-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6631-3_8

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6630-6

  • Online ISBN: 978-1-4020-6631-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics