Font Size: a A A

Analysis And Design Of Secure Protocol On Mobile IP

Posted on:2007-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:J DaiFull Text:PDF
GTID:2178360182477691Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The technology of Mobile IP is based on Mobile communication and Internet. It is a solution on the network layer to enable the Mobile Node roaming ceaselessly among different regions. Rapid developing technology of this field brings us much convenience, and personal communication is the goal of our effort. Before Mobile IP can be widely used in people's daily life, many key problems must be solved. Security is one of the most important battle-neck problems that restrict the practical application of Mobile IP. Aiming at the security of Mobile IP, the work we have done in this paper is as follow:RFC documents on Mobile IP are carefully read and researched. After an introduction of Mobile IPv4 and Mobile IPv6, some faults of Mobile IPv4 and the key problems of Mobile IPv6 are researched.Security problems of network, especially of Mobile IP network and the corresponding countermeasures are studied here.A Mobile IP authentication protocol based on ECC(Elliptic Curves Cryptography)was proposed by Aydos, in 1998, which has been recognized by many researchers of this field. Nowadays, there is much more risks to Mobile IP than ever before. To make Aydos's protocol adapt to rapidly developing circumstance of Mobile IP, we propose an improved Mobile IP authentication protocol which is based on ECC. The process of banding update is of great importance to the security of Mobile Node. Improper banding update scheme could result in mischance to the Mobile users that transmit sensitive messages using their Mobile communication devices or bring to the bone network too many needless messages. A banding update scheme is proposed in this paper, which is based on regional Mobile IPv6 and has good performance especially in the case that many Mobile Nodes travel together from one place to another.
Keywords/Search Tags:Mobile IP, Security, Authentication, Mobility Management
PDF Full Text Request
Related items