Skip to main content

Security of Current Mobile IP Solutions

  • Conference paper
Advances in Database Technologies (ER 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1552))

Included in the following conference series:

  • 329 Accesses

Abstract

Due to the operation of IP’s addressing and routing algorithms, mobile nodes (such as notebooks, portable workstations and palmtop computers) cannot currently participate, while roaming without being reconfigured, in tactical wired and wireless networks, strategic networks or the Internet. A node’s IP address encodes the network access point to which the node is connected. This prevents IP packets from reaching the node if it moves to a new location and tries to connect to its home network from within a different network. Changing the IP address of a node when it moves is not possible while keeping existing transport level connections open. This change requires the termination of all current network activity and the user making a number of configuration changes followed by rebooting of the node.

There are a number of proposed solutions for supporting mobile nodes. Leading approaches are: Mobility Support in IPv4, Route Optimized Mobile IP for IPv4, and Mobility Support in IPv6 that are compatible with the TCP/IP protocol suite. This paper addresses the security needs for IP mobile hosts in the commercial world, the security capabilities and deficiencies of these solutions, and proposed solutions for identified security deficiencies.1

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atkinson, R., “Security Architecture for the Internet Protocol”, RFC 1825, August 1995.

    Google Scholar 

  2. Atkinson, R., “IP Authentication Header”, RFC 1826, August 1995.

    Google Scholar 

  3. Conta, A., Deering, S., “Generic packet tunneling in IPv6 specification”, Internet Draft, draft-ietf-ipngwg-ipv6-tunnel-02.txt, June 1996. Work in progress.

    Google Scholar 

  4. Deering, S., Hinden, R., “Internet Protocol version 6 (IPv6) Specification”, RFC 1883, December 1995.

    Google Scholar 

  5. W. Diffie, W., Heilman, M. E., “New directions in cryptography”, IEEE Transactions on Information Theory, IT-22(6): 644–654, November 1976.

    Article  MathSciNet  MATH  Google Scholar 

  6. Droms, R., “Dynamic Host Configuration Protocol”, RFC 1541, October 1993.

    Google Scholar 

  7. Johnson, D., Perkins, C., “Route Optimization in Mobile IP”, Internet Draft, draftietf-mobileip-optim-07.txt, November 1997. Work in progress.

    Google Scholar 

  8. Johnson, D., Perkins, C., “Mobility Support in IPv6”, Internet Draft, draft-ietf-mobileip-ipv6–06.txt, August 1998. Work in progress.

    Google Scholar 

  9. Perkins, C., Johnson, D., “Registration Keys for Route Optimization”, Internet Draft, draft-ietf-mobileip-regkey-OO.txt, November 1997. Work in progress

    Google Scholar 

  10. Narten, T., Nordmark, E., Simpson, W.A., “Neighbor Discovery for IP version 6 (IPv6)”, RFC 1970, August 1996.

    Google Scholar 

  11. Perkins, C., editor, “IP Mobility Support”, RFC 2002, October 1996.

    Google Scholar 

  12. Rivest, R., “The MD5 Message-Digest Algorithm”, RFC 1321, April 1992.

    Google Scholar 

  13. Schneier, B., “Applied Cryptography 2nd Edition”, Chapter 22 pp. 513–514, John Wiley and Sons Inc., 1996.

    Google Scholar 

  14. Sanchez, L., Troxel, G., “Rapid Authentication for Mobile IP”, Internet Draft, draft-ietf-mobileip-ra-OO.txt, November 1997. Work in progress.

    Google Scholar 

  15. Zao, J., Condell, M., “Use of IPSec in Mobile IP”, Internet Draft, draft-ietfmobileip-ipsec-use-00.txt, November 1997. Work in progress.

    Google Scholar 

  16. Jacobs, S., “Mobile IP Public Key Based Authentication”, Internet Draft, draftjacobs-mobileip-pki-auth-OO.txt, August 1998. Work in progress.

    Google Scholar 

  17. Rivest, R.L., Shamir, A., Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21(2): 120–126, February 1978.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jacobs, S. (1999). Security of Current Mobile IP Solutions. In: Kambayashi, Y., Lee, D.L., Lim, EP., Mohania, M.K., Masunaga, Y. (eds) Advances in Database Technologies. ER 1998. Lecture Notes in Computer Science, vol 1552. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-49121-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-49121-7_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65690-6

  • Online ISBN: 978-3-540-49121-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics