1 |
C. Perkins, D. Johnson & J. Arkko. (2011). Mobility support in IPv6. IETF RFC 6275.
|
2 |
M. B. Yassein, S. Aljawarneh & W. Al-Sarayrah. (2017). Mobility Management of Internet of Things: Protocols, Challenges and Open Issues. IEEE ICEMIS 2017. DOI : 10.1109/ICEMIS.2017.8273021
|
3 |
J. Montavont, D. Roth & T. Noel. (2014). Mobile IPv6 in Internet of Things: Analysis, experimentations and optimizations. Ad Hoc Networks, 14, 15-25. DOI :10.1016/j.adhoc.2013.11.001
DOI
|
4 |
S. Choi & S. Koh. (2016). Use of Proxy Mobile IPv6 for Mobility Management in CoAP-based Internet-of-Things Networks. IEEE Communications Letters, 20(11), 2284-2287. DOI : 10.1109/LCOMM.2016.2601318
DOI
|
5 |
IPSec : Security Architecture for the Internet Protocol, IETF RFC 4301.
|
6 |
Internet Key Exchange (IKEv2) Protocol, IETF RFC 4306.
|
7 |
G. S. Lee. (2002). http://www.tta.or.kr/data/reportDown.jsp?news_num=549
|
8 |
G. Lee, S. Lee, J. Park & Y. Kim. Mobile IPv6 Security Issues and Solutions. http://kidbs.itfind.or.kr/WZIN/jugidong/1050/105001.htm
|
9 |
M. Chuang, J. Lee. & M. Chen. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102-113.
DOI
|
10 |
J. Lee. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38-43.
DOI
|
11 |
G. O'shea & M. Roe. (2001). Child-proof Authentication for MIPv6 (CAM). ACM Computer Couunications Review, 31(2), 4-8.
|