Security Threats Analysis for Network-based Mobile IPv6
![]() |
Kim, Hyun-Gon
(Division of Information Engineering, Mokpo National University)
Seo, Jae-Hyeon (Division of Information Engineering, Mokpo National University) Oh, Byeong-Kyun (Division of Information Engineering, Mokpo National University) Ahn, Tae-Nam (Security Engineering Research Center, Hannam University) Kim, Jin-Hyung (Computer Science, KAIST) |
1 | S. Glass, T. Hiller, S. Jacobs, C. Perkins, 'Mobile IP Authentication, Authorization, and Accounting Requirements', RFC2977, October 2000 |
2 | 김현곤 외 6명, 'AAA 정보보호 기술 표준화 동향', 전자통신동향분석, 제20권 제1호, 2005년 2월 |
3 | 신명기, 김형준, 'IPv6 전환 환경에서의 보안 기술분석', 전자통신동향 분석, 제21권 제5호, pp.163-170, 2006년 10월 |
4 | Nikander, P., Kempf, J., and E. Nordmark, 'IPv6 Neighbor Discovery (ND) Trust Models and Threats', RFC 3756, May 2004 |
5 | 한국정보보호진흥원, 'IPv6 보안 기술 해설서', 2005년 10월 |
6 | Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., Liebsch, M., 'Problem Statement for Network-based Localized Mobility Management', RFC4830, September 2006 |
7 | D. Johnson, C. Perkins, and J.Arkko, 'Mobility Support in IPv6', RFC3755, July 2003 |
8 | Arkko, J., Kempf, J., Zill, B., and P. Nikander, 'SEcure Neighbor Discovery(SEND)', RFC 3971, March 2005 |
9 | C. Vogt, J. Kempf, 'Security Threats to Network-Based Localized Mobility Management (NETLMM)', RFC4832, April 2007 |
10 | 정보흥, 임재덕, 김영호, 김기영, 'IPv6 환경의 보안 위협 및 공격 분석', 전자통신동향분석, 제22권 제 1호, pp.37-50, 2007년 2월 |
11 | CERT Coordination Center, 'CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks', September 1996 |
12 | S. Gumdavelli, K. Leung, et al., 'Proxy Mobile IPv6', draft-ietf-netlmm-proxymipv6-01.txt, June 2007 |
13 | Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., Liebsch, M., 'Goals for Network-based Localized Mobility Management', RFC4831, 2006.10 |
14 | 한국정보보호진흥원, '와이브로 보안기술 해설서', 2006년 8월 |
![]() |