Mobile IP
M. Farooque Mesiya, Rensselaer Polytechnic Institute
Introduction
Overview of Mobile Ipv4
Mobile Ipv4 Protocol Overview
Agent Discovery
Registration
Tunneling
Advantages of Ipv6 for Mobile IP
Address Autoconfiguration in Ipv6
Mobile Ipv6 Overview
Route Optimization
Binding Management Messages
Security Threats in Mobile IP
Theft of Address
Replay Attacks
Denial of Service Attacks
Mobile Ipv4 Security Mechanisms
Mobile Ipv6 Security Mechanisms
Protection of Binding Updates to the Home Agent
Protection of Binding Updates to Correspondent Nodes
Conclusion
Glossary
Cross References
References
INTRODUCTION
Mobile networking is becoming increasingly important as portable devices such as personal digital assistants (PDAs) and laptops become more powerful and less expensive, and as users need to be connected whenever and wherever they are. Mobile Internet protocol (IP) allows portable devices called mobile nodes to roam from one IP subnet to another while maintaining the communication sessions.
An IP address identifies a node (end point) as well as the subnet to which it is connected. The dual usage of IP addresses thus causes problems when a mobile node changes its point of attachment (indicated by a different subnet prefix) to the Internet. Packets destined to the mobile node would not be able to reach it while it is away from its home IP subnet because routing is based on the network prefix in a packet's destination IP address. To continue communication in spite of its mobility, ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.