References
- V. Devarapalli, R. Wakikawa, A. Petrescu, P. Thubert, "Network Mo bility(NEMO) Basic Support Protocol ", IETF, RFC 3963, January 2005.
- D. Johnson, C. Perkins, J. Arkko, "Mobility support in IPv6", IETF, RFC 3775, June 2004.
- L. Lamport, "Password authentication with insecure communication", Communications of the ACM, Vol. 24 (11), pp.770-772, November 1981. https://doi.org/10.1145/358790.358797
- T. Narten, E. Nordmark, W. Simpson. "Neighbor discovery for IP version 6 (IPv6)", RFC 2461, December 1998.
- S. Pack, Y. Choi, "Fast handoff scheme based on mobility prediction in public wireless LAN systems", IEEE Communications, Vol.151(5), pp.489 -495, October 2004. https://doi.org/10.1049/ip-com:20040834
- A. Mishra, M.H. Shin, N.L. Petroni, J.T. Clancy, W.A. Arbauch, "Proactive key distribution using neighbor graphs", IEEE Wireless Communications, Vol.11(1), pp.26-36, February 2004. https://doi.org/10.1109/MWC.2004.1269714
- C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, D. Spence, "Generic AAA architecture", IETF, RFC 2903, August 2000.
- S. Glass, T. Hiller, S. Jacobs, C. Perkins, "Mobile IP authentication, authorization, and accounting requirements", IETF, RFC 2977, October 2000.
- C.E Perkins, "Mobile IP joins forces with AAA", IEEE Personal Communications, RFC 2977, pp.59- 61, August 2000.
- P. Calhoun, T. Johansson, C. Perkins, T. Hiller, "Diameter Mobile IPv4 application", P. McCann (Ed.), RFC 4004, August 2005.
- H. Fathi, S. Shin, K. Kobara, S. Chakraborty, H. Imai, R. Prasad, "LRAKE-based AAA for network mobility (NEMO) over wireless links", IEEE Journal on Selected Areas in Communications (JSAC), Vol.24(9), pp.1725-1737, 2006. https://doi.org/10.1109/JSAC.2006.875111
- I. Hideki, S. Seonghan, K. Kanukuni, "introduction to Leakage-Resilient Authenticated Key Exchanged Protocols and Their Applications", KIISC, December 2008.
- Yingjie Wang, Wei Luo, Changxiang Shen, "Analysis on Imai-Shin's LR-AKE protocol for wireless network security", Communications in Computer and Information Science, Vol.84-89, 2009.
- Ming-Chin Chubng, Jeng-Farn Lee, "A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks" Computer Networks, June 2011.
- Depeng Li, Srinivas Sampalli, "An efficient contributory group rekeying scheme based on hash functions for MANETs", IFIP International Conference on Network and Parallel Computing Workshops, pp.191-198, September 2007.
- W.H.D. Ng, Zhili Sun, H. Cruickshank, "Group key management with network mobility", 13th IEEE International Conference on Networks (ICON), Vol. 2, pp.716-721, November 2005.
- Y. Kim, A. Perrig, G. Tfsudik, "Group key agreement efficient in communication", IEEE transactions on computers, Vol. 53(7) PP.905-921, 2004.
- K. El Malki (Ed.), "Low-Latency Handoffs in Mobile IPv4", IETF, RFC 4881, June 2007.
- R. Koodli (Ed.), "Fast Handoffs for Mobile IPv6", IETF, RFC 5268, June 2008.
- P. McCann, "Mobile IPv6 fast handoffs for 802.11 Networks", IETF, RFC 4260, November 2005.
- S. Gundaveli, K, Leung, V. Devarapali, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6", IETF, RFC 5213, August 2008.
- G, Giaretta, "Interaction between PMIPv6 and MIPv6", draft-ietfnet lmm-mip-interactions-03.txt, November, 2009.
- Jee-Hyeon Na, Soochang Park, Jung-Mo Moon, Sangho Lee, Euisin Lee, and Sang-Ha Kim, "Roaming Mechanism between PMIPv6 Domain ",draft-park-netmm-pmipv6-roaming-o1.txt, July, 2008.
- Yuh-Shyan Chen, Ming-Chin Chuang, Chung-Kai Chen, "DeuceScan: deuce-based fast handoff scheme in IEEE 802.11 wireless networks",IEEE Transaction on Vehicular Technology Conference, Vol. 57(2), pp.1126-1141, September 2008.
- NIST, U.S. Department of Commerce, "Secure Hash Standard", U.S.Federal Information Processing Standard (FIPS), August 2002.
- Ki-Sik Kong, Wonjun Lee, Youn-Hee Han, Myung-Ki Shin,HeungRyeol You, "Mobility management for All-IP mobile networks: Mobile IPv6 vs. proxy mobile IPv6", IEEE Wireless Communications, Vol. 15(2), pp.36-45, 2008. https://doi.org/10.1109/MWC.2008.4492976
- S. Thomson, T. Narten, "IPv6 stateless address autoconfiguration", IETF, RFC 2462, December 1998.
- I. Im, YH Cho, JY Choi, J. Jeong "Security-Effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks", Computational Science and Its Applications-ICCSA 2012, Vol.7336, pp.543-559, 2012.
- I. Im, J. Jeong, "Cost-effective and fast handoff scheme in Proxy Mobile IPv6 networks with multicasting support", Mobile Information Systems, IOS Press, July 2013.
- E.J. Lee, P.J. Lee, "Multul Authentication and Session Key Agreement Protocol Using only a Hash Function", Vol.7 No. 1, KIISC, 1997
- W. Diffie and M.E.Hellman, "New Directions in Cryptography", IEEE Transaction of Information Theory, IT-22, 6, pp.644-654, 1976
- S. Jang, J. Jeong, "Cost-Effective and Distributed Mobility Management Scheme in Sensor-Based PMIPv6 Network with SPIG Support", JIWIT, August, August 2012.