Vous êtes sur la page 1sur 1

CSIT - 50

MOBILE COMPUTING
By
A.P. Shravanthi
K.S.R.M. College of Engineering, Kadapa

Abstract
Survivability and secure communications are essential in a mobile computing
environment. In a secured network, all the hosts in the local network must be
authenticated before they communicate with the hosts outside the network. The failure of
tile nodes/agents that authenticate the hosts may completely detach the hosts from the rest
of the network. In this paper, we describe two techniques to eliminate such a single point
of failure. Those two techniques are
VIRTUAL HOME AGENT
HIERARCHICAL AUTHENTICATION
Both of these techniques make use of backup servers, but they are architecturally
different. We address the scalability issue of the techniques proposed by a cluster-based
scheme where the front –end directs the request to a group of back-end machines.
Providing security services in the mobile computing environment is challenging because
it is more vulnerable for instruction and eavesdropping. Typically, a Base Station (BS)
serves all the hosts in a Local Area Network. To get the service, the hosts have to
authenticate themselves with BS. When the base station BS moves to a foreign network,
the hosts in LAN are not aware of BS’s movement and the packets that originate from
this LAN are dropped. This disruption of service is caused by the movement of base
station that traditional networking protocols cannot handle. Two simple approaches to
handle the above problem are as follow.
TO SETUP PROXY BASE STATION
TO SETUP ANOTHER BASE STATION TO FORWARD PACKETS TO
ORIGINAL BASE STATON

Vous aimerez peut-être aussi