Mobile IP security in VPNs

  • Authors:
  • M. C. Niculescu;Elena Niculescu;I. Resceanu

  • Affiliations:
  • Dep. of Mechatronics and Electronics and Instrumentation, University of Craiova, Craiova, Romania;Dep. of Mechatronics and Electronics and Instrumentation, University of Craiova, Craiova, Romania;Dep. of Mechatronics and Electronics and Instrumentation, University of Craiova, Craiova, Romania

  • Venue:
  • DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats. In a typical RFID (Radio Frequency Identification) system, tags storing a unique identifier and additional data are attached to objects or issued to people. When a tag or a group of tags is placed in the radio frequency field of a reader, the data contained in the tag's memory can be accessed by the reader. The data are usually preprocessed and passed on to enterprise applications by the RFID middleware. The RFID system, consisting of readers and tags, along with the RFID middleware and the enterprise applications is referred to as the RFID infrastructure.