Security policy for deducting unauthorized IP based mobile host inside the network

  • Authors:
  • V. K. Sanjeevi;Veluchandhar Veluchandhar;S. Sakthivel;M. Supriya

  • Affiliations:
  • BSNL, India;Department of Computer Science, St.Joseph's College, Tiruchirappalli, India;Wipro Info Tech, Bangalore, India;Wipro Info Tech, Bangalore, India

  • Venue:
  • EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The technology evaluation of mobile management system has integrated with significant improvement in mobile computing. The requirements for mobile security are more important when we are accessing the sensitive data from the database. Concurrency control ensures that individual users meet consistent states of the mobile databases with security. But in the IP based mobile network the relay of data is not continuous and also the connection may lose at any time. The IP alone is not suitable for identifying the mobile host inside the network. In this paper, it is proposed a model to enhance the performance of mobile security for IP based mobile host.