Mobility support with authentic firewall traversal in IPv6

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This paper proposes a protocol to support mobile hosts in IPv6 by introducing a new addressing architecture and a new hop-by-hop option. This protocol also allows a mobile host to communicate with another host via a firewall machine which drops packets from untrustworthy hosts. The new addressing scheme is based on the separation of the identifier and the location of a mobile host. This is a straightforward implementation of the basic concept of VIP, a protocol providing seamless mobility in IPv4. The new hop-by-hop option of IPv6 allows a firewall machine to authenticate the source host of the forwarded packet with negligible overhead. The author plans to implement this protocol on several operating systems in the near future.

Original languageEnglish
Pages (from-to)1132-1137
Number of pages6
JournalIEICE Transactions on Communications
VolumeE80-B
Issue number8
Publication statusPublished - 1997
Externally publishedYes

Keywords

  • Authentication
  • Firewall
  • Internet
  • Ipv6
  • Mobility
  • Protocol

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Mobility support with authentic firewall traversal in IPv6. / Teraoka, Fumio.

In: IEICE Transactions on Communications, Vol. E80-B, No. 8, 1997, p. 1132-1137.

Research output: Contribution to journalArticle

@article{61b6ef74207d44cfb92f4684ca0a77d9,
title = "Mobility support with authentic firewall traversal in IPv6",
abstract = "This paper proposes a protocol to support mobile hosts in IPv6 by introducing a new addressing architecture and a new hop-by-hop option. This protocol also allows a mobile host to communicate with another host via a firewall machine which drops packets from untrustworthy hosts. The new addressing scheme is based on the separation of the identifier and the location of a mobile host. This is a straightforward implementation of the basic concept of VIP, a protocol providing seamless mobility in IPv4. The new hop-by-hop option of IPv6 allows a firewall machine to authenticate the source host of the forwarded packet with negligible overhead. The author plans to implement this protocol on several operating systems in the near future.",
keywords = "Authentication, Firewall, Internet, Ipv6, Mobility, Protocol",
author = "Fumio Teraoka",
year = "1997",
language = "English",
volume = "E80-B",
pages = "1132--1137",
journal = "IEICE Transactions on Communications",
issn = "0916-8516",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "8",

}

TY - JOUR

T1 - Mobility support with authentic firewall traversal in IPv6

AU - Teraoka, Fumio

PY - 1997

Y1 - 1997

N2 - This paper proposes a protocol to support mobile hosts in IPv6 by introducing a new addressing architecture and a new hop-by-hop option. This protocol also allows a mobile host to communicate with another host via a firewall machine which drops packets from untrustworthy hosts. The new addressing scheme is based on the separation of the identifier and the location of a mobile host. This is a straightforward implementation of the basic concept of VIP, a protocol providing seamless mobility in IPv4. The new hop-by-hop option of IPv6 allows a firewall machine to authenticate the source host of the forwarded packet with negligible overhead. The author plans to implement this protocol on several operating systems in the near future.

AB - This paper proposes a protocol to support mobile hosts in IPv6 by introducing a new addressing architecture and a new hop-by-hop option. This protocol also allows a mobile host to communicate with another host via a firewall machine which drops packets from untrustworthy hosts. The new addressing scheme is based on the separation of the identifier and the location of a mobile host. This is a straightforward implementation of the basic concept of VIP, a protocol providing seamless mobility in IPv4. The new hop-by-hop option of IPv6 allows a firewall machine to authenticate the source host of the forwarded packet with negligible overhead. The author plans to implement this protocol on several operating systems in the near future.

KW - Authentication

KW - Firewall

KW - Internet

KW - Ipv6

KW - Mobility

KW - Protocol

UR - http://www.scopus.com/inward/record.url?scp=0031198906&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0031198906&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:0031198906

VL - E80-B

SP - 1132

EP - 1137

JO - IEICE Transactions on Communications

JF - IEICE Transactions on Communications

SN - 0916-8516

IS - 8

ER -