عنوان مقاله
کلیاتی در رابطه با امنیت Ipv6 موبایل
فهرست مطالب
فهرست
مقدمه
پیشینه
روش کارکرد IPSec
تجزیه و تحلیل امنیت
نتیجه گیری
بخشی از مقاله
روش کارکردIPSec
IPSec از رمزنگاری و فیلترینگ بسته استفاده می کند، در اینجا رمزنگاری به دستیابی به محرمانگی، صحت و اعتبار و یکپارچگی داده های کاربر کمک می کند. این ها اجزایی هستند که به همراه روابط متقابلشان، شامل معماری منطقی IPSec می شوند. در این بخش، راجع به اجزای بنیادی معماری IPSec به طور مختصر توضیح داده شده است.
کلمات کلیدی:
Overview of Mobile IPv6 Security Amirhossein Moravejosharieh Department of Computer system and technology University of Malaya Kuala Lumpur, Malaysia Amirhosein.moravej@ siswa.um.edu.my Hero Modares Department of Computer system and technology University of Malaya Kuala Lumpur, Malaysia hero.modares@ siswa.um.edu.my Rosli Salleh Department of Computer system and technology University of Malaya Kuala Lumpur, Malaysia rosli_salleh@um.edu.my Abstract— Mobile IP enables a mobile node to be recognized via a single IP address even though the node may travel from one network to another. Despite reposition between different networks, connectivity at different positions is attained continuously with no user intervention. Mobile IP grants connectivity to nodes everywhere, whether within home networks or away from home. General improvement in MIPv6 may offer enhanced security; however, there are areas still prone to attacks. Security solutions for the mobile IP protocol are still in progress. IP Security (IPsec) in the IPv6 protocol can secure Mobile IPv6 more than IPv4. IPsec presents security services for the application and transportation layer protocols of the TCP/IP stack. However, there are several unsolved concerns and problems with Mobile IPv6 in most cases which justifies development of new methods to provide acceptable level of security. This article focuses on how IPsec works, Mobile IPv6 security, potential threats and security considerations. Keywords- Internet Protocol security (IPsec); Mobile IPv6 security; potential threats in MIPv6 and security considerations. I. INTRODUCTION There are various implementations presented for Mobile IPv6. Some have been successful, while other concepts such as security bandwidth consumption and seamless handover are still concerns that researchers are trying to improve [1]. Communication privacy is a basic necessity of each user in public communication. A summary of necessary security issues includes how sender and receiver authenticate each other before creating any connection (addressing as trust), how communication between senders and receivers is protected against eavesdropping and tampering (addressing as confidentiality), and how authenticated users follow private communication (addressing as authorization). On the other hand, secure communication over the internet is essential for important applications such as banking, purchasing, making payments, virtual private network (VPN) and so on. Security includes peer authentication, and is encouraged by authorization to make use of resources, secret key and exchanges, and private communication using algorithms. Security can be provided either at the IP layer or transport layer. For example, Secure Socket Layer (SSL) is used to make a secure http which is visible as an https on a web page. The VPN applications for roaming users are based either on IP Security or SSL, which are both enough to provide the minimum security functions necessary. IP mobility is concerned with IP layer security so in this paper the focus is on preparing a summary of IP Security (IPsec). Authentication,