By Topic

Optimization routing and security features for transparent mobile IP

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
A. Giovanardi ; Ferrara Univ., Italy ; G. Mazzini

By considering the problem of transparently linked mobile hosts (MH), i.e., without reconfigurations and host software modifications, this paper gives a possible solution and the relative details on the implementation. Even if the communications between MH to fixed hosts (FH) have just been investigated, the main topic of this work concerns those of MH versus MH (MH-to-MH). The transparent implementation is based on the introduction of network agents with proxy, tunneling and signaling functions that have been changing and improving in order to optimize MH-to-MH links by means of suitable notification procedures. In order to avoid intruders and unauthorized users, or those who should acquire privileges or perform dangerous procedures, security features based on an authentication strategy and a secure hash algorithm have been implemented. The system has been designed, realized and tested in an actual environment, by verifying that the average performance of MH-to-MH optimized links are closer to those of FH-to-FH

Published in:

Global Telecommunications Conference, 1998. GLOBECOM 1998. The Bridge to Global Integration. IEEE  (Volume:2 )

Date of Conference: