Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Security of current mobile IP solutions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jacob, S. ; GTE Labs. Inc., Waltham, MA, USA ; Cirincione, G.

Due to the operation of an IP's addressing and routing algorithms, mobile nodes (such as notebooks, portable workstations and palmtop computers) cannot currently participate while roaming without being reconfigured in tactical wired and wireless networks, strategic networks or the Internet. A node's IP address encodes the network access point to which the node is connected. This prevents IP packets from reaching the node if it moves to a new location and tries to connect to its home network from within a different network. Changing the IP address of a node when it moves is not possible while keeping existing transport level connections open. This change requires the termination of all current network activity and the user making a number of configuration changes followed by rebooting of the node. There are a number of proposed solutions for supporting mobile nodes (leading approaches are: mobility support in IPv4, route optimized mobile IP for IPv4, and mobility support in IPv6), that are compatible with the TCP/IP protocol suite. This paper addresses the security needs for IP mobile hosts in the tactical battlefield, the security capabilities and deficiencies of these solutions, and proposed solutions for identified security deficiencies

Published in:

MILCOM 97 Proceedings  (Volume:3 )

Date of Conference:

2-5 Nov 1997