Durr et al., 2008 - Google Patents
An analysis of security threats to mobile IPv6Durr et al., 2008
- Document ID
- 7454119162673637520
- Author
- Durr M
- Hunt R
- Publication year
- Publication venue
- International Journal of Internet Protocol Technology
External Links
Snippet
In parallel with the design of IPv6, several protocol extensions for mobility support of IPv6 nodes have been proposed and these continue to evolve. However, a variety of security threats arise and these have to be taken in to account in the design of such protocol …
- 238000004458 analytical method 0 title description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/082—Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation, e.g. WAP [Wireless Application Protocol]
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/15—Directories; Name-to-address mapping
- H04L61/1505—Directories; Name-to-address mapping involving standard directories or standard directory access protocols
- H04L61/1511—Directories; Name-to-address mapping involving standard directories or standard directory access protocols using domain name system [DNS]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nikander et al. | Mobile IP version 6 route optimization security design background | |
EP2589197B1 (en) | Method and devices for a light-weight security solution for host-based mobility and multihoming protocols | |
US8009631B2 (en) | IP mobility | |
US8094565B2 (en) | Loop detection for mobile IP home agents | |
Deng et al. | Defending against redirect attacks in mobile IP | |
JP5250634B2 (en) | Method and apparatus for use in a mobile communication network | |
JP2010507301A (en) | Method in mixed network-based and host-based mobility management | |
JP2010527549A (en) | Methods in mixed network-based and host-based mobility management | |
JP2010506520A (en) | Method and apparatus for MobileIP route optimization | |
Ren et al. | Routing optimization security in mobile IPv6 | |
JP4468453B2 (en) | Optimized round trip confirmation | |
Modares et al. | A survey of secure protocols in mobile IPv6 | |
Shah et al. | A TOTP‐Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead | |
Aura et al. | Security of Internet location management | |
Aura et al. | Designing the mobile IPv6 security protocol | |
Praptodiyono et al. | Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey | |
Kempf et al. | Mobile IPv6 security | |
Durr et al. | An analysis of security threats to mobile IPv6 | |
Koskiahde | Security in Mobile IPv6 | |
Oryema et al. | Secure mobility management using CoAP in the Internet of Things | |
Hossain et al. | Security vulnerabilities and protection mechanisms of mobility management protocols | |
Tripathi et al. | Security issues in mobile IPv6 | |
Brian et al. | Security scheme for mobility management in the internet of things | |
Dhawale et al. | A robust secured mechanism for mobile IPv6 threats | |
Park | A robust secured Mobile IPv6 mechanism for multimedia convergence services |