

Security Issues in Mobile Communication with MIPv6: A Survey
Abstract
Keywords
References
Johnson D, Perkins C, Arkko J, “Mobility Support in IPv6”, IETF RFC3775
James Kempf, Jari Arkko, Pekka Nikander, “Mobile IPv6 Security”, International Journal of Personal Communications, Vol. 29, Issue 3, 2004, pp. 389-414
Khaled Elgoarany, Mohamed Eltoweissy, “Security in Mobile IPv6 : A Survey”, Information Security Technical Report – Elsevier, Vol. 12(1), 2007, pp. 32-43
Tuomas Aura, Michael Roe, "Designing the Mobile IPv6 Security Protocol", Technical Report 2006, Microsoft Research, UK
Marc Blanchet, “Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks”, John Wiley & Sons, Inc., Publication, 2006, ISBN 0-471-49892-0
Rajeev S Koodli, Charles E Perkins, "Mobile Inter-Networking with IPv6: Concepts, Principles, and Practices", John Wiley & Sons, Inc., Publication, 2007
Yen-Cheng Chen, Fu-Chen Yang, "An Efficient MIPv6 Return Routability Scheme Based on Geometric Computing", International Journal of Electronics, Communications and Computer Engineering, Vol.1, No.4, 2009, ISSN: 2073-0543, pp. 138-143
Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou,Robert H. Deng, "Routing optimization security in mobile IPv6",Elsevier - Computer Networks, 50 (2006), pp. 2401–2419
Jung-Doo Koo, Dong-Chun Lee, “Extended Ticket-based Binding Update (ETBU) Protocol for Mobile IPv6 (MIPv6) Networks”, IEICE Transactions on Communications, Vol.E90-B, No.4, April 2007
J. Arkko, V. Devarapalli, F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents", IETF RFC 3776, 2004.
S. Kent, K. Seo, "Security Architecture for the Internet Protocol", IETF RFC 4301, 2005.
S. Kent, "IP Authentication Header", IETF RFC 4302, 2005
S. Kent, "IP Encapsulating Security Payload (ESP)", IETF RFC 4303, 2005
D. Harkins, D. Carrel, “The Internet Key Exchange”, IETF RFC 2409, 1998
Silvia Hagen, “IPv6 Essentails”, O’Reilly Media publications, 2002, ISBN: 978-0-596-00125-4
D. Maughan, M. Schertler, M. Schneider, J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", IETF RFC 2408, 1998
H. Orman, “The OAKLEY Key Determination Protocol”, IETF RFC 2412, 1998
P. Ferguson, D. Senie, “Network Ingress Filtering - Defeating Denial of Service Attacks which employ IP Source Address Spoofing”, IETF RFC 2827, 2000
SuGil Choi, Kwangjo Kim, ByeongGon Kim, "Practical Solution for Location Privacy in Mobile IPv6", Proceedings of International Workshop on Information Security Applications, Springer-LNCS 2908, pp. 69–83, 2004
Tianhan Gao, Nan Guo, Zhiliang Zhu, "Policy-based Distributed Security Management Scheme in MIPv6",Proceedings of International Conference on Computer Science and Software Engineering, 2008, pp. 915-918
R Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin, "A Robust Return Routability Procedure for Mobile IPv6", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008, pp.234-240
Christian Veigner, Chunming Rong, "Flooding Attack on the Binding Cache in Mobile IPv6", Springer - Communications in Computer and Information Science, 2007, Volume 3, Part 3, pp.187-200, DOI: 10.1007/978-3-540-75993-5_16
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.