By considering the problem of transparently link mobile hosts (MH), i.e., without reconfigurations and host software modifications, this paper gives a possible solution and the relative details on implementation. Even if the communication between MH to fixed hosts (FH) have just been investigated, the main topic of this work concerns those of MH versus MH (MH-to-MH). The transparent implementation is based on the introduction of network agents with proxy, tunneling and signaling functions that have been changing and improving in order to optimize MH-to-MH links by means of suitable notification procedures. In order to avoid intruders and unauthorized users, or those who should acquire privileges or perform dangerous procedures, security features based on an authentication strategy and a secure hash algorithm have been implemented. The system has been designed, realized and tested in an actual environment, by verifying that the average performance of MH-to-MH optimized links are closer ...
Optimization Routing and Security Features for Transparent Mobile IP
GIOVANARDI, Alessandra;MAZZINI, Gianluca
1998
Abstract
By considering the problem of transparently link mobile hosts (MH), i.e., without reconfigurations and host software modifications, this paper gives a possible solution and the relative details on implementation. Even if the communication between MH to fixed hosts (FH) have just been investigated, the main topic of this work concerns those of MH versus MH (MH-to-MH). The transparent implementation is based on the introduction of network agents with proxy, tunneling and signaling functions that have been changing and improving in order to optimize MH-to-MH links by means of suitable notification procedures. In order to avoid intruders and unauthorized users, or those who should acquire privileges or perform dangerous procedures, security features based on an authentication strategy and a secure hash algorithm have been implemented. The system has been designed, realized and tested in an actual environment, by verifying that the average performance of MH-to-MH optimized links are closer ...I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.