IP-based protocols for mobile internetworking
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
Protocols for mobile internetworking
Protocols for mobile internetworking
TCP-R: TCP mobility support for continuous operation
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Move: mobility with persistent network connections
Move: mobility with persistent network connections
Host Mobility Using an Internet Indirection Infrastructure
Proceedings of the 1st international conference on Mobile systems, applications and services
A mobile networking system based on internet protocol(IP)
MLCS Mobile & Location-Independent Computing Symposium on Mobile & Location-Independent Computing Symposium
Comparison of IP micromobility protocols
IEEE Wireless Communications
Mobility management in current and future communications networks
IEEE Network: The Magazine of Global Internetworking
Mobile TCP socket for secure applications
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Hi-index | 0.00 |
The predominance of short-lived connections in today's Internet has created the perception that it is perfectly acceptable to change a host's IP address with little regard about established connections. Indeed, the increased mobility offered by laptops with wireless network interfaces, and the aggressive use of short DHCP leases are leading the way towards an environment where IP addresses are transient and last for short time periods. However, there is still a place for long-lived connections (typically lasting hours or even days) for remote login sessions, over the network backups, etc. There is, therefore, a real need for a system that allows such connections to survive changes in the IP addresses of the hosts at either end of the connection. In this paper we present a kernel-based mechanism that recognizes address changes and recovers from them. Furthermore, we discuss the security implications of such a scheme, and show that our system provides an effective defense against both eavesdropping and man-in-the-middle attacks.