SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP

Mark W. Andrews, Ronan J. Skehill, Michael Barry, Sean McGrath

2005

Abstract

Mobility has become an integral part of modern computing. It increases user flexibility by releasing the potential of fixed data. Reliance on a static computing platform is not sufficient for the future needs of nomadic users. Portable e-mail devices have become popular in recent years due to their simplicity and functionality. These devices give the average user transparent access to their e-mail from any location. Similar transparent access does not exist for general notebook or Personal Digital Assistant (PDA) computing environments. This paper addresses such access, and details a secure mobility architecture from which users can extract greater value. It utilises Mobile IP, IP Security, Internet Key Exchange and Firewalls to provide a comprehensive mobility solution. It evaluates a test-bed in which this secure mobility solution was deployed, and discusses the viability of a secure, transparent architecture which supports mobility.

References

  1. Atkinson, R., 1995. RFC 1825. IP Security (IPSec).
  2. Atkinson, R., 1995. RFC 1826. IP Authentication Header
  3. CERT, 2005. CERT Coordination Centre Statistics 1988- 2004. http://www.cert.org/stats/cert_stats.html
  4. CERT, 2001. CERT Coordination Centre Home Network Security.
  5. Chandra Kopparapu, 2002. Load Balancing Servers, Firewalls and Caches. WILEY.
  6. Group 1 Internet, 2004. Firewall Technologies.
  7. http://www.group1ifw.com/fw_tech.html
  8. Harkins. D & Carrel. D, 1998. RFC2409. The Internet Key Exchange (IKE).
  9. Intel Networking, White Paper IP Security, 1999.
  10. ITFacts.biz, 2003. Network Security Applicances Sales Surge. http://www.itfacts.biz/index.php?id=P476
  11. Montenegro, G., 2001. RFC3024. Reverse Tunneling for Mobile IP.
  12. Perkins, C., 2002. RFC3344. IP Mobility Support for Ipv4.
  13. Redi, J. & Bahl, P. 1998. Mobile IP: A solution for transparent, seamless mobile computer communications.
  14. RocSearch, 2004-2005, Worldwide Market Potential and Acceptability, RocSearch.
  15. RSA Laboratories, 2004. Diffe Hellman.
  16. http://www.rsasecurity.com/rsalabs/faq/3-6-1.html
  17. Toms Hardware Guide. February 2005. Notebook shipments at all time high.
  18. http://news.com.com/Notebooks+continue+shipment+gain s/2100-1044_3-5070313.html
  19. Tom Dunigan, 2004. Virtual Private Networks. http://www.csm.ornl.gov/dunigan/vpn.html
  20. Valentia Community College, 2005. Network Security, http://valencia.cc.fl.us/oit/network_security.cfm
  21. Webopedia, 2005. VPN Definition.
Download


Paper Citation


in Harvard Style

W. Andrews M., J. Skehill R., Barry M. and McGrath S. (2005). SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 41-48. DOI: 10.5220/0001410300410048


in Bibtex Style

@conference{icete05,
author={Mark W. Andrews and Ronan J. Skehill and Michael Barry and Sean McGrath},
title={SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={41-48},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001410300410048},
isbn={972-8865-32-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP
SN - 972-8865-32-5
AU - W. Andrews M.
AU - J. Skehill R.
AU - Barry M.
AU - McGrath S.
PY - 2005
SP - 41
EP - 48
DO - 10.5220/0001410300410048