
 
payload.  This provides the Security Parameter 
Index (SPI), sequence number and other 
authentication data required (RFC1826).   
2.3.2  IPSec Encapsulated Security Payload 
In IPSec Encapsulated Security Payload (ESP) 
transport mode, an ESP header is inserted between 
the IP header and IP payload.  An ESP trailer and 
authentication MAC are added to the end of the 
packet.  In tunnel mode ESP, the entire packet is 
encrypted and appended to a new ESP header and IP 
header, with an authentication trailer added (Intel 
Networking, 1999). 
2.4  Internet Key Exchange 
Internet Key Exchange (IKE) is defined as an IPSec 
(IP Security) standard protocol used to ensure 
security for Virtual Private Network (VPN) 
negotiation.  IKE defines an automatic means of 
negotiation and authentication for IPSec SAs 
(Security Associations).  Security Associations are 
security policies defined for communication between 
two or more entities (Harkins, 1998).  A key 
represents the relationship between the entities.  IKE 
in essence, enables the establishment of a symmetric 
key between two entities using a cryptographically 
secure key exchange mechanism.  This exchange is 
called Diffie Hellman, and a key is established in the 
following manner: 
1.  Alice and Bob select a prime 
number  p and calculate p’s generator g.  
These two calculated values are public 
2.  Alice chooses a large private 
number, such that x < p and transmits Bob 
the remainder x from the equation:  
x = g
x
 mod p 
3.  Similarly Bob chooses a large 
private number, such that y  <  p  and 
transmits Alice the remainder y  from the 
equation: 
y = g
y
 mod p  
4.  Alice calculates the remainder: 
     s = y
x
 mod p 
5.  Bob calculates the remainder: 
      s` = x
y
 mod p 
6.  The remainders s and s` are equal 
because: 
      s = s`= g
xy
 mod p 
7.  Thus Alice and Bob now share a 
symmetric key s,  which can be used for 
fast encryption by both parties. 
8.  It is not possible to obtain the 
value  s  from the two public keys passed 
over the Internet, since the final value s 
also depends on the two private values, 
which remain secret (Diffe Hellman, 2004). 
IKE also grants the ability to change encryption 
keys during an IP Security session.  This is useful in 
situations where the lifetime of the key should be 
changed frequently for security purposes.   
2.5  General Comment 
The security components discussed are necessary in 
order to provide confidentiality, integrity, 
authorisation and non-repudiation for the secure 
mobility architecture.  The final component, Mobile 
IP, enables the transparent network connectivity 
between mobile nodes and the ‘home network’.  
Mobile IP, while not a viable solution by itself, can 
be used in conjunction with other protocols such as 
those already discussed, to provide a secure 
cryptosystem that completes the overall architecture. 
3  MOBILE IP 
The fundamental need for Mobile IP arises when a 
node connected to the Internet changes its point of 
attachment (Redi, 1998).  This means, when a 
mobile node moves from its home network to a 
foreign network, such as a public wireless hotspot, 
there will be transparent network connectivity to the 
home network from the new location.  
TCP/IP was not designed to support this type of 
connectivity.  However, with the use of Mobile IP, 
the mobile node can configure itself with the aid of 
devices called ‘agents’ for such connectivity.  This 
process is transparent to users, allowing them to 
maintain contact with the ‘home network’ at all 
times by any network media.   
Each agent device in Mobile IP carries out a 
specific function.  The ‘Home Agent’ resides on the 
users ‘home network’.  This device acts as a packet 
forwarder.  If the Mobile Node is attached to a 
‘foreign network’, any packets destined for the 
Mobile Node will be intercepted by the Home Agent 
using proxy ARP (Address Resolution Protocol), 
and forwarded using IP-in-IP encapsulation to the 
‘foreign network’ using the mobile nodes Care-Of 
Address (Perkins, 2002).  Hence, the Home Agent 
acts as the Mobile Nodes point of attachment to the 
Internet when it is located on a ‘foreign network’.  
Once the tunnelled packet reaches the ‘foreign 
network’, a Foreign Agent decapsulates the data and 
forwards it to the Mobile Node residing on its 
network.  Figure 2, illustrates the triangular route the 
Mobile IP protocol typically uses between the 
SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP
43