Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security in Mobile IPv6: A survey
Information Security Tech. Report
Comparing WiMAX and HSPA: a guide to the technology
BT Technology Journal
4G Wireless Begins to Take Shape
Computer
An introduction to access security in UMTS
IEEE Wireless Communications
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks
IEEE Journal on Selected Areas in Communications
The IEEE 802.11g standard for high data rate WLANs
IEEE Network: The Magazine of Global Internetworking
Access path based source address validation in mobile IPv6
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
Journal of Network and Computer Applications
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |
Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.