Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

INTRODUCTION

Wireless communication “has witnessed a growth number of users in the recent years;
one of the main advantages of wireless technology is mobility, which allow mobile users to
move from one network to another and maintaining their permanent IP address. This keeps
transportation and high level connections while moving. Mobile IP is a standard convention
built up by the Internet Engineering Task Force "IETF", to give a productive and adaptable
system for portable hubs inside the internet. Mobile IP environments mostly exist in wireless
networks where users need to carry their devices across several networks with different IP
address.

Mobile IP is built on the IP protocol for internet infrastructure. As Mobile IP is a layer


3 solution for IP mobility, it will suffer from security problem in the same way as IP. As
such the issue of securing Mobile IP has become the most significant point with increasing
demand on Mobile IP. The main goal of network security is to provide confidentiality,
availability and integrity for data communication. In general confidentiality protects data so
that it is not disclosed from unauthorized persons.

The need for continuous correspondence when the cell phone moves starting with one area
then onto the next requires the another innovation. This kind of communication can be
efficiently implemented using Mobile IP. Mobile IP, which is an extension to standard
Internet Protocol proposed by the Internet Engineering Task Force(IETF). The fundamental
factors that impact the requirement for Mobile IP are:-

• Mobility Support, expanded number of portable clients.

• Standardization, utilizes the current IP Protocol

• Inter-Operability, can be utilized across various specialist organizations

• Alternative Technologies, absence of appropriate choices other than Mobile IP

• IPv4 Availability, restricted accessibility of IPv4 address requires the requirement for
Mobile IP

• Improved Security, while enlisting with the home specialist

Mobile IP could be stretched out to include all the innovations for consistent portability if the
accompanying issues are settled. These are

• Security Issues

• Triangulation Problems

• Reliability Issues
LITRERATURE REVIEW
The KirtiRaj Bhatele, et al.,presented hybrid security protocol for better security

using a combination of both symmetric and asymmetric cryptographic algorithms. In

this hash value of the decrypted message using AES algorithm is calculated using MD5

algorithm. This hash value has been encrypted with dual RSA and the encrypted

message of this hash value also sent to destination. Now at the receiving end, hash

value of decrypted plaintext is calculated with MD5 and then it is compared with the

hash value of original plaintext which is calculated at the sending end for its integrity.

By this we are able to know whether the original text being altered or not during

transmission in the communication medium.

Arash Habibi Lashkari, et al., [8] presented a survey on wireless security protocols

(WEP, WPA and WPA2/802.11i). Here WEP protocol types, weaknesses and

enhancements, WPA protocol types, WPA improvements such as cryptographic

message integrity code or MIC, new IV sequencing discipline, per packet key mixing

function and rekeying mechanism. They also explained major problems on WPA that

happened on PSK part of algorithm. Finally paper explained third generation of

wireless security protocol as WPA2/802.11i.

Gamal Selim, et al., [9] explained various types of security attacks modification,

fabrication, interception, brute force, maintainability and static placement of MIC. They

surveyed currently available security protocols i.e. WEP, WEP2, WPA and WPA2.

They also proposed a new mechanism called multiple slot system (MSS). MSS makes

use of the key selector, slot selector and MIC shuffle selector. MSS uses one of four

encryption algorithm RC4, RSA, Blowfish and AES.

Hyung-Woo Lee, et al., [10] explained various issues and challenges in wireless

sensor network. Paper explained two types of wireless security attacks – one is the

attack against the security mechanisms and another is against the basic mechanisms like .
COURSE OUTCOME ADDRESSED
 Larn about Security of Ip address
 Protect from online threats
 Helps in improving Security
 Improves Security and helps to prevent

PROPOSED METHODOLOGY
Since Mobile IP uses open airwaves as a transmission medium, it is subject to the many
security threats that are routed in mobile IP network .Protecting mobile IP from threats and
attacks is one of the most challenging task now days. IPSec is a standard security protocol
solution for TCP/IP network that provides security through Authentication, Encryption and
data integrity services. Mobile IP data traffic can be secured by combining with IP Security
(IPSec) protocol. This thesis describes Mobile IP operations, security threats, different
existing methods for securing mobile IP and then IPSec standard, how it works and why
IPSec is the best solution. This thesis also describes how to combine IPSec with a mobile IP
to provide a solution called (SecMIP) that protects the mobile device’s communication from
any threats.finally it describe mobile IPV6 ,binding update and associated security concern.

ACTION PLAN
Sr.no Details of Planned date Planned finish Name of
activity date responsible team
members
1 Finalization of All team
project title and members
scope
2 Application All team
overview members
3 Test planning All team
members
4 Test case All team
development members
5 Test environment All team
setup members

6 Test execution All team


members
7 Test reporting All team
members
8 Demonstration of All team
project and final members
submission

RESOURCES REQUIRED

You might also like