You are on page 1of 8

ABSTRACT

In modern era, the popularity of new technology such as mobile phone landline,

the mobile communication become most important not only for business and pleasure, it

also become one part of life. Nowadays, mobile communication is increasingly popular. We

can see many people who use mobile phones anywhere (office, at home, on the way to work). In

the year of 2003, the number of users of mobile communications is even more than a landline.

There are many threats occur when we are using new mobile technology, which cause

our data loss, theft, and other personal data are leaked.

A Smartphone user shows a diversity of threats when using his phone. In total,

since some applications could be malware, their functionality and feat should be

fractional (for example, restricting access to location information by GPS, blocking

entrée to the user's address book, prevent transmission of data in the network, send

SMS messages that are billed to the user There are some main objectives for attackers

(data, identity and availability).

In this study we describe the combination of protocols, such as Mobile IP and

IPSec standard which is the best solution of creating issues and problems, which is

called (SecMIP) that protect the mobile network from any threats.

1
CHAPTER ONE

INTRODUCTION

1.1 background of the study

Data network allows nodes to share resources through telecommunication network.

There are many numbers of applications and services which support computer network,

such as digital audio, digital video and many other applications and services. Security is

so important in computer network to protect the information or message. There for

network security only permission authorize person to access data from network, which

is controlled by the network administrator. User login his/ her user name and password

or other authenticating information that access network.

In this study we are going to secure our computer network, using some protocols which

protect our network services. We also discuss all problems and their solution in this

research.

1.2 purpose of the study

Designing services security system for advance mobile networks require high level

protection of authentication, confidentiality, data integrity, and no repudiation by this we

are going to discuss in this research work to provide strong security skin that could be

strong and very easy.

1.3 problems of the statement

As we know that before time mobile network system was designed very simple and very

simple parts of networks. The designing of this communication have been primarily to

2
present cost-effective wide area coverage for a limited number of users with sensible

bandwidth such as low rate data and voice. During a sending data or information

through communication network a lot of problems are created, such as ID theft, data

loss, personal data are leaked and other issues can be created. In this study we are

going to discuss all problems and their solution using the combination of protocols ( MIP

and IPSec).

1.4 Significance of the study


Consequence and aims of this research that the billions of smart devices will create

large amounts of data every day. This data can be used to supply a better user

experience, improve product services and profit the development of other data-based

searches, such as health and fitness, routine management and business administration.

The important thing in this study is to offer functional security architecture, as well as

easy security management methods for the mobile network.

1.5 Keywords
Mobile network, Network security, MIP, IPSec.
Mobile network: mobile network is a wireless network. Its frequency is use to increase
the capacity.
Network security: Outhorize person only access network data using authenticating
information. In network security user enter your name and password to access internet.
MIP: One type of protocol which is used IP- address for exchanging one location to
other.
IPSec. Internet security protocol most important security protocol, it is use for data
encryption which sent over IPV4 network.

1.6 scope and limitation of the study

This study of security and management of the mobile network is a qualitative research.
Each outset has its own boundaries and limits. In the mobile network, each layer has its

3
own challenges and security problems. In each layers different types of threats occurs.
For this we here use different methods and mechanism in different layers to counteract
the corresponding security threats.

CHAPTER TWO

LITERATURE REVIEW

In this chapter we are going to discuss the current literature on the selected area. In this
chapter we study the “IPSec: and “IP” internet protocols security architecture and
different threats.

2.1 IPsec protocol

In network security IPsec is one important protocol which is used for encrypt the
packets of data through IPV4 network. The proposed protocol IPsec used for security in
communication process which provide several services. set of this protocol developed
to make certain the integrity, confidentiality and authentication of data traffic through
network. IPSec protocol are also called Virtual private network. It used the tunnel mode
during sending data over network. When the communication parties share security
scheme such as algorithm and key than IPsec protocol used security association. In this
protocol two hosts are agreeing to use DES and IDEA algorithm for data encrypt, see
the flowing fig.

4
2.2 IPSec Modes

There are four basic combination modes of IPSec protocols, such as AH transport
mode, Ah tunnel mode, ESP in transport mode and ESP in tunnel modes. These modes
and protocols are used to protect several data packet through network. Here we are
defining only two IPSec modes, such as.
2.2.1 Transport Mode: Here AH and ESP protects the transport header and provides
the configuration security.
2.2.2 Tunnel Mode: this mode is used for forwarding packet when router provide
security services

2.3 IPSec Scenarios

IPSec provide security technology to protect data through network in several scenarios.

We discuss many different scenarios, such as


1. filter data packet
2. strong security between hosts
3. provide two tunnel protocols

The scenarios process show in the following figure as

5
So security association (SA) is a key concept behind this idea. This security association
(SA) is basically very simple connection that affords services to the traffic carried by it. It
also identified a uniquely security parameter index for IP destination address and
security protocols such as authentication header of encapsulation security payload.

6
CHAPTER THREE

RESEARCH METHODOLOGY

3.1Purpose of Research:

The main purpose of this research to secure network services of mobile communication.

In study we discuss several issues and their solution, using combination of “IP” and

“IPSec” protocols.

3.2 Meaning of Research:

According to the definition of research that, Research is a gradually process to collect

knowledge about the topic. The collection of data and information about our research

topic is called the research process. Research is the process of investigation. Using

investigate we make our project more capable and useful. If we use research

methodology or research methods for our project then the probability of error and bugs

are become fewer.

3.3 Research methods

According to the methodology, the research can be divided several methods in which

create knowledge, the research problems and the user group. There are we define only

two methods for research, such as qualitative research and quantitative research.

7
1. Qualitative Research

This research presents a non-quantitative analysis. Qualitative research refers to the

meanings, definitions, characteristics, symbols, metaphors, and description of things.

Qualitative research is much more subjective and uses very different methods of

collecting information, mainly individual, in-depth interviews and focus groups. In our

study we are also using qualitative research and “SIMULATOR” for result.

ii. Quantitative research

This research presents numbers, figures and numeric. Quantitative research is basically

used for measure the amount and compares it with the precedent record. The objective

of quantitative research is to develop and employ mathematical models, theories or

hypothesis pertaining to phenomena.

3.4 Data Collection Procedure:

In data collection method the application of mobile IP are liable to happen in scenarios

which extended public network. In this method we simulate current process through

authentication header protocol in transport mode. This represents very least we

simulate this process through the Authentication Header protocol in Transport cheap

computational authentication method by providing IPSec protocols. In simulation

method we developed a filter in which we insert delay and the payload. The filter

inserted input and output agents for simulation of the encryption and authentication of

the registration messages.

You might also like