ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Journal Article
Publisher : International Journal of Computer Applications
Source : International Journal of Computer Applications, Foundation of Computer Science, Volume 51, Issue 17, p.239-243 (2012)
Keywords : Authentication, Confidentiality, Non-repudiation, Registration delay, Replay attack and User anonymity
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Verified : Yes
Year : 2012
Abstract : IP Mobility which was established to facilitate mobility within a worldwide system of interconnected computer networks gives a scalable solution for different networks. As the commercial use of the internet becomes common for IP Mobility through the wireless communication, it is necessary to construct a secure IP Mobility in a registration process which informs the location of the portable systems such as mobile devices to the home network. While registering the locality with the packet transmission by the portable system, the security issues are of paramount importance and this registration must be secured against any cruel attacks that might attempt to acquire unauthorized advantages from any participating principals. The need for secure way to do Mobile IP registration has given rise to a number of protocols. This paper discusses the various existing Mobile IP Registration protocols. The simulation and comparisons has been conducted on the different protocols with the security parameters and registration time to evaluate each protocol’s efficiency.
Cite this Research Publication : Dr. Senthil Kumar M. and Valarmathi, M. L., “Mobile IP registration protocols: a survey”, International Journal of Computer Applications, vol. 51, no. 17, pp. 239-243, 2012.