1 |
S. Baek, S. Pack, T. Kwon and Y. Choi, "A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots", Proc. IEEE/IFIP WONS 2006, Jan. 2006.
|
2 |
A. Patel, "Authentication protocol for mobile IPv6", RFC 4285, Jan. 2006.
|
3 |
C. Perkins and P. Calhoun, "Authentication, authorization, and accounting (AAA) registration keys for mobile IPv4", RFC 3957, Mar. 2005.
|
4 |
W. Liang and W. Wang, "On performance analysis of challenge/response based authentication in wireless local area networks", Computer Networks and ISDN Systems, Vol. 48, pp. 267-288, June 2005.
|
5 |
A. Hess and G. Schafer, "Performance evaluation of AAA/mobile IP authentication", Proc. 2nd PGTS, Sep. 2002.
|
6 |
B.J. Han, J.M. Lee, J.H. Lee and T.M. Chung, "PMIPv6 route optimization mechanism using the routing table of MAG", IEEE Systems and Networks Communications ICSNC'08 3rd International Conference on, pp. 274-279, Oct. 2008.
|
7 |
S. Park, N. Kang, and Y. Kim, "Localized proxy-MIPv6 with route optimization in IP-based Networks", IEICE Trans. Commun., Vol. E90B, no. 12, Dec. 2007.
|
8 |
D. Johnson, C. Perkins, and J. Arkko, "Mobility support in IPv6", RFC 3775, June 2004.
|
9 |
S. Gundavelli, K. Leung, V. Devarapalli and K. Chowdhury, "Proxy mobile IPv6", RFC 5213, Aug. 2008.
|
10 |
R. Koodli, "Fast handovers for mobile IPv6", RFC 4068, July 2005.
|
11 |
H. Yokota, K. Chowdhury and R. Koodli, "Fast handovers for Proxy mobile IPv6", Internet draft-IETF, draft-ietf-mipshop-pfmipv6-08.txt, July 2009.
|
12 |
H. Zhou, H. Zhang and Y. Qin, "An authentication method for proxy mobile IPv6 and performance analysis", Security and Communication Networks, Nov. 2008.
|