[go: up one dir, main page]

Tuquerres et al., 1999 - Google Patents

Mobile IP: security & application

Tuquerres et al., 1999

View PDF
Document ID
16833496131097931998
Author
Tuquerres G
Salvador M
Sprenkels R
Publication year

External Links

Snippet

MOBILE IP: SECURITY & APPLICATION Gloria Tuquerres, Marcos Rogério Salvador and Ron Sprenkels e-mails: {tuquerre, salvador, Page 1 MOBILE IP: SECURITY & APPLICATION Gloria Tuquerres, Marcos Rogério Salvador and Ron Sprenkels e-mails: {tuquerre, salvador …
Continue reading at research.utwente.nl (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
US7174018B1 (en) Security framework for an IP mobility system using variable-based security associations and broker redirection
Arkko et al. Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents
EP1094682B1 (en) Mobile phone incorporating security firmware
US8346949B2 (en) Method and system for sending a message through a secure connection
US20120117376A1 (en) Method and apparatus for anonymous ip datagram exchange using dynamic newtork address translation
Elgoarany et al. Security in mobile IPv6: a survey
Xenakis et al. On demand network-wide VPN deployment in GPRS
Tuquerres et al. Mobile IP: security & application
Haitao et al. The security issues and countermeasures in Mobile IP
US7694334B2 (en) Apparatus and method for traversing gateway device using a plurality of batons
Niculescu et al. Mobile IP security and scalable support for transparent host mobility on the internet
Jiang Network Security in RWNs
KR100596397B1 (en) Session Key Distribution Method of Radius-based AAA Server in Mobile IPv6 Environment
Korhonen et al. Mobile IPv6 security framework using transport layer security for communication between the mobile node and home agent
Dhawale et al. A robust secured mechanism for mobile IPv6 threats
Islam Enhanced security in Mobile IP communication
Khan et al. IPsec in mobile IP: a survey
Basak et al. Security in Network Mobility (NEMO): Issues, Solutions, Classification, Evaluation, and Future Research Directions.
Arkko et al. RFC 3776: Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents
Xenakis et al. Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
Liu et al. A secure mobile-IPv6 network model
Sanchez et al. Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks
Abdelgadir et al. Security overview on mobile IP networks
Nafarrete et al. Secure wireless handoff
Valverde et al. Secure wireless handoff