Professional Documents
Culture Documents
In modern era, the popularity of new technology such as mobile phone landline,
the mobile communication become most important not only for business and pleasure, it
also become one part of life. Nowadays, mobile communication is increasingly popular. We
can see many people who use mobile phones anywhere (office, at home, on the way to work). In
the year of 2003, the number of users of mobile communications is even more than a landline.
There are many threats occur when we are using new mobile technology, which cause
our data loss, theft, and other personal data are leaked.
A Smartphone user shows a diversity of threats when using his phone. In total,
since some applications could be malware, their functionality and feat should be
entrée to the user's address book, prevent transmission of data in the network, send
SMS messages that are billed to the user There are some main objectives for attackers
IPSec standard which is the best solution of creating issues and problems, which is
called (SecMIP) that protect the mobile network from any threats.
1
CHAPTER ONE
INTRODUCTION
There are many numbers of applications and services which support computer network,
such as digital audio, digital video and many other applications and services. Security is
network security only permission authorize person to access data from network, which
is controlled by the network administrator. User login his/ her user name and password
In this study we are going to secure our computer network, using some protocols which
protect our network services. We also discuss all problems and their solution in this
research.
Designing services security system for advance mobile networks require high level
are going to discuss in this research work to provide strong security skin that could be
As we know that before time mobile network system was designed very simple and very
simple parts of networks. The designing of this communication have been primarily to
2
present cost-effective wide area coverage for a limited number of users with sensible
bandwidth such as low rate data and voice. During a sending data or information
through communication network a lot of problems are created, such as ID theft, data
loss, personal data are leaked and other issues can be created. In this study we are
going to discuss all problems and their solution using the combination of protocols ( MIP
and IPSec).
large amounts of data every day. This data can be used to supply a better user
experience, improve product services and profit the development of other data-based
searches, such as health and fitness, routine management and business administration.
The important thing in this study is to offer functional security architecture, as well as
1.5 Keywords
Mobile network, Network security, MIP, IPSec.
Mobile network: mobile network is a wireless network. Its frequency is use to increase
the capacity.
Network security: Outhorize person only access network data using authenticating
information. In network security user enter your name and password to access internet.
MIP: One type of protocol which is used IP- address for exchanging one location to
other.
IPSec. Internet security protocol most important security protocol, it is use for data
encryption which sent over IPV4 network.
This study of security and management of the mobile network is a qualitative research.
Each outset has its own boundaries and limits. In the mobile network, each layer has its
3
own challenges and security problems. In each layers different types of threats occurs.
For this we here use different methods and mechanism in different layers to counteract
the corresponding security threats.
CHAPTER TWO
LITERATURE REVIEW
In this chapter we are going to discuss the current literature on the selected area. In this
chapter we study the “IPSec: and “IP” internet protocols security architecture and
different threats.
In network security IPsec is one important protocol which is used for encrypt the
packets of data through IPV4 network. The proposed protocol IPsec used for security in
communication process which provide several services. set of this protocol developed
to make certain the integrity, confidentiality and authentication of data traffic through
network. IPSec protocol are also called Virtual private network. It used the tunnel mode
during sending data over network. When the communication parties share security
scheme such as algorithm and key than IPsec protocol used security association. In this
protocol two hosts are agreeing to use DES and IDEA algorithm for data encrypt, see
the flowing fig.
4
2.2 IPSec Modes
There are four basic combination modes of IPSec protocols, such as AH transport
mode, Ah tunnel mode, ESP in transport mode and ESP in tunnel modes. These modes
and protocols are used to protect several data packet through network. Here we are
defining only two IPSec modes, such as.
2.2.1 Transport Mode: Here AH and ESP protects the transport header and provides
the configuration security.
2.2.2 Tunnel Mode: this mode is used for forwarding packet when router provide
security services
IPSec provide security technology to protect data through network in several scenarios.
5
So security association (SA) is a key concept behind this idea. This security association
(SA) is basically very simple connection that affords services to the traffic carried by it. It
also identified a uniquely security parameter index for IP destination address and
security protocols such as authentication header of encapsulation security payload.
6
CHAPTER THREE
RESEARCH METHODOLOGY
3.1Purpose of Research:
The main purpose of this research to secure network services of mobile communication.
In study we discuss several issues and their solution, using combination of “IP” and
“IPSec” protocols.
knowledge about the topic. The collection of data and information about our research
topic is called the research process. Research is the process of investigation. Using
investigate we make our project more capable and useful. If we use research
methodology or research methods for our project then the probability of error and bugs
According to the methodology, the research can be divided several methods in which
create knowledge, the research problems and the user group. There are we define only
two methods for research, such as qualitative research and quantitative research.
7
1. Qualitative Research
Qualitative research is much more subjective and uses very different methods of
collecting information, mainly individual, in-depth interviews and focus groups. In our
study we are also using qualitative research and “SIMULATOR” for result.
This research presents numbers, figures and numeric. Quantitative research is basically
used for measure the amount and compares it with the precedent record. The objective
In data collection method the application of mobile IP are liable to happen in scenarios
which extended public network. In this method we simulate current process through
simulate this process through the Authentication Header protocol in Transport cheap
method we developed a filter in which we insert delay and the payload. The filter
inserted input and output agents for simulation of the encryption and authentication of