Professional Documents
Culture Documents
Introductio1 KKK
Introductio1 KKK
Wireless communication “has witnessed a growth number of users in the recent years;
one of the main advantages of wireless technology is mobility, which allow mobile users to
move from one network to another and maintaining their permanent IP address. This keeps
transportation and high level connections while moving. Mobile IP is a standard convention
built up by the Internet Engineering Task Force "IETF", to give a productive and adaptable
system for portable hubs inside the internet. Mobile IP environments mostly exist in wireless
networks where users need to carry their devices across several networks with different IP
address.
The need for continuous correspondence when the cell phone moves starting with one area
then onto the next requires the another innovation. This kind of communication can be
efficiently implemented using Mobile IP. Mobile IP, which is an extension to standard
Internet Protocol proposed by the Internet Engineering Task Force(IETF). The fundamental
factors that impact the requirement for Mobile IP are:-
• IPv4 Availability, restricted accessibility of IPv4 address requires the requirement for
Mobile IP
Mobile IP could be stretched out to include all the innovations for consistent portability if the
accompanying issues are settled. These are
• Security Issues
• Triangulation Problems
• Reliability Issues
LITRERATURE REVIEW
The KirtiRaj Bhatele, et al.,presented hybrid security protocol for better security
this hash value of the decrypted message using AES algorithm is calculated using MD5
algorithm. This hash value has been encrypted with dual RSA and the encrypted
message of this hash value also sent to destination. Now at the receiving end, hash
value of decrypted plaintext is calculated with MD5 and then it is compared with the
hash value of original plaintext which is calculated at the sending end for its integrity.
By this we are able to know whether the original text being altered or not during
Arash Habibi Lashkari, et al., [8] presented a survey on wireless security protocols
(WEP, WPA and WPA2/802.11i). Here WEP protocol types, weaknesses and
message integrity code or MIC, new IV sequencing discipline, per packet key mixing
function and rekeying mechanism. They also explained major problems on WPA that
Gamal Selim, et al., [9] explained various types of security attacks modification,
fabrication, interception, brute force, maintainability and static placement of MIC. They
surveyed currently available security protocols i.e. WEP, WEP2, WPA and WPA2.
They also proposed a new mechanism called multiple slot system (MSS). MSS makes
use of the key selector, slot selector and MIC shuffle selector. MSS uses one of four
Hyung-Woo Lee, et al., [10] explained various issues and challenges in wireless
sensor network. Paper explained two types of wireless security attacks – one is the
attack against the security mechanisms and another is against the basic mechanisms like .
COURSE OUTCOME ADDRESSED
Larn about Security of Ip address
Protect from online threats
Helps in improving Security
Improves Security and helps to prevent
PROPOSED METHODOLOGY
Since Mobile IP uses open airwaves as a transmission medium, it is subject to the many
security threats that are routed in mobile IP network .Protecting mobile IP from threats and
attacks is one of the most challenging task now days. IPSec is a standard security protocol
solution for TCP/IP network that provides security through Authentication, Encryption and
data integrity services. Mobile IP data traffic can be secured by combining with IP Security
(IPSec) protocol. This thesis describes Mobile IP operations, security threats, different
existing methods for securing mobile IP and then IPSec standard, how it works and why
IPSec is the best solution. This thesis also describes how to combine IPSec with a mobile IP
to provide a solution called (SecMIP) that protects the mobile device’s communication from
any threats.finally it describe mobile IPV6 ,binding update and associated security concern.
ACTION PLAN
Sr.no Details of Planned date Planned finish Name of
activity date responsible team
members
1 Finalization of All team
project title and members
scope
2 Application All team
overview members
3 Test planning All team
members
4 Test case All team
development members
5 Test environment All team
setup members
RESOURCES REQUIRED