{"title":"安全移动IP通信","authors":"T. Braun, Marc Danzeisen","doi":"10.1109/LCN.2001.990839","DOIUrl":null,"url":null,"abstract":"This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components. It only requires a slight adaptation of the end system communication software in order to adapt the mobile IP and IP security protocol implementations to each other. The paper describes the concept, prototype implementation, and initial performance measurement results.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"46","resultStr":"{\"title\":\"Secure mobile IP communication\",\"authors\":\"T. Braun, Marc Danzeisen\",\"doi\":\"10.1109/LCN.2001.990839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components. It only requires a slight adaptation of the end system communication software in order to adapt the mobile IP and IP security protocol implementations to each other. The paper describes the concept, prototype implementation, and initial performance measurement results.\",\"PeriodicalId\":213526,\"journal\":{\"name\":\"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"46\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2001.990839\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2001.990839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components. It only requires a slight adaptation of the end system communication software in order to adapt the mobile IP and IP security protocol implementations to each other. The paper describes the concept, prototype implementation, and initial performance measurement results.