Abstract
In the IETF, when the handover occurs on wireless network environment, it proves Mobile Node’s uniqueness and security, and encourages the RR technique and security system comparable for safe Route Optimization. To complement weakness about technique for obtaining an existing security, security agreement that uses an independent AAA Protocol in aspect of infrastructure is now under discussion. With the utilization of the AAA infrastructure in this thesis, it maintains established security level and suggests a technique that improves Quality of Service as fast handover by constructing security system based on ISPC structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Calhoun, P.R., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Network Access Server Application. IETF AAA WG, INTERNET-DRAFT, Draft-ietf-aaa0diameter-nasreq-17.txt (July 2004)
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. Draft-ietf-mext-rfc3775bis-02.txt (October 2008)
Le, F., Patil, B., Perkins, C.E., Faccin, S.: Diameter Mobile IPv6 Application. Internet-Draft (November 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Cho, W., Park, B., Lee, S. (2012). A Robust Security Methodology for Supporting Reliable Multimedia Database System. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Communications in Computer and Information Science, vol 310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32692-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-32692-9_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32691-2
Online ISBN: 978-3-642-32692-9
eBook Packages: Computer ScienceComputer Science (R0)