1 |
V. Narayanan, N. Venkitaraman, H. Tschofenig, G. Giaretta, and J. Bournelle, "Establishing Handover Keys using Shared Keys," IETF Internet Draft, draft-vidya-mipshop-handover-keys-aaa-04, March 2007
|
2 |
H. Yokota, K. Chowdhury, R. Koodli, B. Patil, and F. Xia, "Fast Handovers for Proxy Mobile IPv6," IETF Internet Draft, draft-ietf-mipshop-pfmipv6-12, Dec. 2009.
|
3 |
Y. Han and B. Park. "A Fast Handover Scheme in Proxy Mobile IPv6," IETF Internet Draft, draft-han-netlmm-fast-pmipv6-00, July 2008.
|
4 |
C. Vogt and J. Kempf, "Security Threats to Network-Based Localized Mobility Management (NETLMM)," IETF RFC 4832, Apr. 2007
|
5 |
D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6," IETF RFC 3775, June 2004
|
6 |
R. Koodli, "Mobile IPv6 Fast Handovers," IETF RFC 5268, June 2008
|
7 |
H. Soliman, C. Castelluccia, K. ElMalki, and L. Bellier, "Hierarchical Mobile IPv6 (HMIPv6) Mobility Management," IETF RFC 5380, Oct. 2008
|
8 |
J. Arkko, C. Vogt, and W. Haddad, "Enhanced Route Optimization for Mobile IPv6," IETF RFC 4866, May 2007
|
9 |
R.H. Deng, J. Zhou, and F. Bao, "Defending against redirect attacks in mobile IP," In Proc. of the 9th ACM conference on Computer and Communications Security, pp. 59-67, Nov. 2002.
|
10 |
I. You, K. Sakurai and Y. Hori, "A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6," IEICE Transaction on Communications, Vol. E92-B, no. 06, pp.2287-2290, June 2009
DOI
ScienceOn
|
11 |
J. Kempf and R. Koodli, "Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)," IETF RFC 5269, June 2008
|
12 |
W. Haddad and S. Krishnan, "Authenticating FMIPv6 Handovers," IETF Internet Draft, draft-haddad-mipshop-fmipv6-auth-02, Sep. 2006
|
13 |
F. Dupont, M. Laurent-Maknavicius and J. Bournelle, "AAA for mobile IPv6," IETF Internet Draft, draft-dupont-mipv6-a-aa-01, Nov. 2001
|
14 |
I. You, K. Sakurai, and Y. Hori, "An Enhanced Security Protocol for Fast Mobile IPv6," IEICE Transaction on Information & Systems, Vol. E92-D, No.10, pp. 1979-1982, Oct. 2009
DOI
ScienceOn
|
15 |
J. Arkko, J. Kempf, B. Zill, and P. Nikander, "SEcure Neighbor Discovery (SEND)," IETF RFC 3971, Mar. 2005
|
16 |
T. Aura, "Cryptographically Generated Addresses (CGA)," IETF RFC 3972, Mar. 2005
|
17 |
S. Kiriyama, R. Wakikawa, J. Xia and F. Teraoka, "Context Reflector for Proxy Mobile IPv6," In Proc. of 2009 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 588-594, Mar. 2009
|
18 |
S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6," IETF RFC 5213, Aug. 2009
|