Mobile IP

M. Farooque Mesiya, Rensselaer Polytechnic Institute

Introduction

Overview of Mobile Ipv4

Mobile Ipv4 Protocol Overview

Agent Discovery

Registration

Tunneling

Advantages of Ipv6 for Mobile IP

Address Autoconfiguration in Ipv6

Mobile Ipv6 Overview

Route Optimization

Binding Management Messages

Security Threats in Mobile IP

Theft of Address

Replay Attacks

Denial of Service Attacks

Mobile Ipv4 Security Mechanisms

Mobile Ipv6 Security Mechanisms

Protection of Binding Updates to the Home Agent

Protection of Binding Updates to Correspondent Nodes

Conclusion

Glossary

Cross References

References

INTRODUCTION

Mobile networking is becoming increasingly important as portable devices such as personal digital assistants (PDAs) and laptops become more powerful and less expensive, and as users need to be connected whenever and wherever they are. Mobile Internet protocol (IP) allows portable devices called mobile nodes to roam from one IP subnet to another while maintaining the communication sessions.

An IP address identifies a node (end point) as well as the subnet to which it is connected. The dual usage of IP addresses thus causes problems when a mobile node changes its point of attachment (indicated by a different subnet prefix) to the Internet. Packets destined to the mobile node would not be able to reach it while it is away from its home IP subnet because routing is based on the network prefix in a packet's destination IP address. To continue communication in spite of its mobility, ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.