...s, the temporaryscomponent of a mobile node address could be exposedsto spoofing attacks on the home agent. Mobility requiressspecial security measures and networks administratorssmust be fully aware.=-=[1]-=-sII. TCP/IP ARCHITECTUREsThe TCP/IP protocol suite referred to as the Internet protocolssuite, is the set of communication protocol that implements thesprotocol stack on which the internet and most co...
...e sender, ansaddress of the receiver, symmetric encrypt key, encryptionsalgorithm, compressing algorithm, compressing enable and SEslifetime for which this SE will stay alive in security cache. Fig.2s=-=[2]-=- shows a four- way handshaking approach to establish a securesconnection and exchange symmetric encryption keys between thessender and receiver.sFigure 2: Exchanging symmetric encryption key using fou...
...ond byte, which indicates the upper layersprotocol, is an identical field to the one in the original IP header.sThe upper layer protocol field is filled with 255 to indicate thatsTSP protocol is used =-=[3]-=-.sIII. CRYPTOGRAPHIC ALGORITHMsCryptography algorithms provide high security to informationson controlled networks. These algorithms are required to providesdata security and users authenticity. Numer...