1 |
C. Veigner and C. Rong, “Flooding Attack on the Binding Cache in Mobile IPv6,” 2007.
|
2 |
P. Nikander, J. Arkko, T. Aura, and G. Montenegro, “Mobile IP version 6 (MIPv6) route optimization security design,” in Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, 2003, pp.2004-2008 Vol.3.
|
3 |
S. Ortiz, “4G Wireless Begins to Take Shape,” Computer, Vol.40, pp.18-21, 2007.
DOI
ScienceOn
|
4 |
D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775, June, 2004.
|
5 |
C. Veigner and C. Rong, “A new Route Optimization protocol for Mobile IPv6 (ROM),” in International Computer symposium Taipei, 2004.
|
6 |
T. Aura, “Mobile IPv6 Security,” in Security Protocols, 2004, pp.3-13.
|
7 |
R. H. Deng, J. Zhou, and F. Bao, “Defending against redirect attacks in mobile IP,” in 9th ACM Conference on Computer and Communications Security (CCS), Washington, 2002, pp.59-67.
DOI
|
8 |
C. Perken, “IP Mobility Support,” RFC 2002, October, 1996.
|
9 |
K. Elgoarany and M. Eltoweissy, “Security in Mobile IPv6: A survey,” Information Security Technical Report, Vol.12, pp.32-43, 2007.
|
10 |
K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, and R. H. Deng, “Routing optimization security in mobile IPv6,” Computer Networks, Vol.50, pp.2401-2419, 2006.
DOI
ScienceOn
|
11 |
O. S. Greg and R. Michael, “Child-proof authentication for MIPv6 (CAM),” SIGCOMM Comput. Commun. Rev., Vol.31, pp.4-8, 2001.
DOI
|
12 |
H. Fathi, S. SeongHan, K. Kobara, S. S. Chakraborty, H. Imai, and R. Prasad, “Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks,” Selected Areas in Communications, IEEE Journal on, Vol.23, pp.2182-2193, 2005.
DOI
ScienceOn
|