1 |
D. Johnson, C. Perkins, and J. Arkko, "Mobility support in IPv6," RFC 3775, Jun. 2004.
|
2 |
S. Gundavelli, K. Leung, V. Devarapalli, K. Chowd-hury, and B. Patil, "Proxy Mobile IPv6," Internet Draft, draft-ietf-netlmm-proxymip6- 10.txt, IETF, Feb. 2008.
|
3 |
T. Aura, "Mobile IP security, security protocols," The 10th Int'l Workshop, LNCS 2845, pp. 17-19, 2002.
|
4 |
T. Aura, M. Roe, and J. Arkko, "Security of internet location management," In Proc. of the 18th Annual Computer Security Applications Conference, pp. 78-90, Dec. 2002.
|
5 |
P. Nikander, J. Arkko, T. Aura, G. Montenegro, and E. Nordmark, "Mobile IP version 6 route optimization security design background," RFC 4225, Dec. 2005.
|
6 |
C. Vogt, et. al., "Security threats to network- based localized mobility management (NETLMM)," RFC 4832, Apr. 2007.
|
7 |
H. Zhou, H. Zhang, and Y. Qin, "An authentication method for proxy mobile IPv6 and performance analysis," Security and Communication Networks, vol. 2, pp. 445-454, Sep. 2008.
|
8 |
S.G. Ryu, G.Y. Kim, B.G. Kim, and Y.S. Mun, "A scheme to reduce packet loss during PMIPv6 handover considering authentication," International Conference on Computational Sciences and Its Applications, ICCSA, pp. 47-51, Jun. 2008.
|
9 |
J.H. Lee, J.H. Lee, and T.M. Chung, "Ticket-based authentication mechanism for proxy Mobile IPv6 environment," The Third International Conference on Systems and Networks Communications 2008, pp. 304-309, Oct. 2008.
|
10 |
J.W. Song and S.Y. Ha, "One-time key authentication protocol for PMIPv6," Third 2008 International Conference on Convergence and Hybrid Information Technology, pp. 1150-1153, Nov. 2008.
|
11 |
J.H. Lee and T.M. Chung, "A traffic analysis of authentication methods for proxy Mobile IPv6," 2008 International Conference on Information Security and Assurance, pp. 512-517, Aug. 2008.
|
12 |
H. Zhou, H. Zhang, Y. Qin, H.C. Wang, and H.C. Chao, "A proxy Mobile Ipv6 based global mobility management architecture and protocol," Mobile Networks and Applications (MONET), vol. 15, no. 4, pp. 530-542, Aug. 2010.
DOI
|
13 |
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC:keyed-hashing for message authenti cation," RFC 2104, Feb. 1997.
|
14 |
S.M. Baek, S.H Pack, T.M. Kwon, and Y.H. Choi, "A localized authentication, authoriza tion, and accounting (AAA) protocol for mobile hotspots," In Proceedings of IEEE/ IFIP Annual Conference on Wireless On demand Network Systems and Services (WONS) 2006, pp. 144-153, Jan. 2006.
|
15 |
R. Koodli, "Fast handovers for Mobile IPv6," RFC 4068, Jul. 2005.
|
16 |
H. Yokota, K. Ch., R. Koodli, B. Patil, and F. Xia, "Fast handovers for proxy Mobile IPv6," Internet Draft, draft-ietf-mipshop-pfmipv6- 14.txt, Sep. 2010.
|
17 |
Web page of Krb Working Group, "http://www.ietf.org/html.charters/krb-wg-charter.html," Accessed on Apr. 2008.
|
18 |
J. Laganier, S. Narayanan, and P. McCann, "Interface between a proxy MIPv6 mobility access gateway and a mobile node," Internet Draft, draft-ietf-net-lmm- mn-ar-if-03, Aug. 2008.
|
19 |
W. Wang and I.F. Akyildiz, "Intersystem location update and paging schemes for multitier wireless networks," In Proceedings of International conference on Mobile computing and networking (Mobi-Com) 2000, pp. 99-109, Aug. 2000.
|