skip to main content
research-article

Mobile IP: enabling user mobility

Published: 01 December 2006 Publication History

Abstract

This review paper gives a brief insight about Mobile IP, its features and entities constituting Mobile IP environment. The paper explores the working and routing mechanism of Mobile IP with a deep insight about triangle routing in Mobile IP Version 4(MIPv4) and route optimization in Mobile IP Version 6(MIPv6). This paper discusses several security issues regarding Mobile IP implementation. This paper also highlights route optimization problems and focuses on the solution of those problems.

References

[1]
{1} C. Perkins, D. Johnson, and J. Arkko. Mobility Support in IPv6. Internet Draft, IETF, February 26, 2003.
[2]
{2} Charles Perkins and David B. Johnson. Route Optimization in Mobile IP. Internet Draft, IETF, 6 September 2001.
[3]
{3} Introduction to Mobile IP. Version Number 1, Released 10/08/2001.
[4]
{4} Rajeev Koodli. Fast Handovers for Mobile IPv6. Internet Draft, IETF, 1 March 2003.
[5]
{5} Ericsson, and Jari Arkko. Security Framework for Mobile IPv6 Route Optimization. Internet Draft, November 2001.
[6]
{6} J. Arkko and T. Aura. MIPv6 BU Attacks and Defenses. Internet Draft, February 2002.
[7]
{7} Tuomas Aura. Mobile IPv6 Security. Microsoft Research Ltd. Roger Needham Building, 7 JJ Thomson Avenue, Cambridge, CB3 0FB, UK.
[8]
{8} Ericsson, J. Arkko, and V. Devarapalli. Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. Internet Draft, IETF, February 18, 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Ubiquity
Ubiquity  Volume 2006, Issue December
December 2006
3 pages
EISSN:1530-2180
DOI:10.1145/1217835
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2006
Published in UBIQUITY Volume 2006, Issue December

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. binding acknowledge message
  2. binding cache
  3. binding request message
  4. binding update message
  5. binding warning message
  6. care-of-address
  7. collocated care-of-address
  8. correspondent agent
  9. correspondent node
  10. foreign agent
  11. foreign network
  12. home address
  13. home agent
  14. home network
  15. mobile IP
  16. mobile node
  17. tunnel
  18. visitor list

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)291
  • Downloads (Last 6 weeks)22
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Investigation of Potential Cognition Factors Correlated to Fire EvacuationSpatial Cognition XII10.1007/978-3-030-57983-8_12(143-159)Online publication date: 25-Aug-2020
  • (2017)Analysis of deployment challenges of Host Identity Protocol2017 European Conference on Networks and Communications (EuCNC)10.1109/EuCNC.2017.7980675(1-6)Online publication date: Jun-2017
  • (2015)Securing 4G/5G wireless networksComputer Fraud & Security10.1016/S1361-3723(15)30036-12015:5(8-12)Online publication date: May-2015
  • (2012)ReviewJournal of Network and Computer Applications10.1016/j.jnca.2011.09.00135:1(295-315)Online publication date: 1-Jan-2012
  • (2010)Building safety and human behaviour in fire: A literature reviewFire Safety Journal10.1016/j.firesaf.2009.08.00545:1(1-11)Online publication date: Jan-2010
  • (2007)Open Source Mobile VPNs over Converged All-IP NetworksJournal of Network and Systems Management10.1007/s10922-007-9075-816:2(163-181)Online publication date: 12-Sep-2007

View Options

View options

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media