SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
Security of Internet Location Management
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Casper: A Compiler for the Analysis of Security Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Wireless Personal Communications: An International Journal
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
PAK-based Binding Update Method for Mobile IPv6 route optimization
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
Security in Mobile IPv6: A survey
Information Security Tech. Report
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
EHAC'09 Proceedings of the 8th WSEAS international conference on Electronics, hardware, wireless and optical communication
Analysis and Optimization of Cryptographically Generated Addresses
ISC '09 Proceedings of the 12th International Conference on Information Security
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Survey of authentication in mobile IPv6 network
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
A new authentication scheme of binding update protocol on handover in mobile IPv6 networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Survey on Route Optimization Schemes for Proxy Mobile IPv6
IMIS '12 Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
Journal of Network and Computer Applications
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
Hi-index | 0.00 |
Mobile IPv6, also known as MIPv6, is an IP-layer protocol that offers mobility support. The MIPv6 protocol allows Mobile Nodes (MNs) to remain connected to Correspondent Nodes (CNs), even when moving to foreign networks. Basically, MNs may change their position throughout the IPv6 network while retaining their existing connections by managing address variations in the Internet layer. Numerous advantages are thus attained, but security remains a fundamental concern. According to our research, a number of protocols can form a secure connection environment between MNs and CNs, though each has advantages and disadvantages. This paper presents a state-of-the art survey of security protocols in MIPv6. Moreover, we propose taxonomy, and comparative study that does not exist in the surveys in the literature. Along with the location management feature within these protocols, potential attacks and security threats, together with the security services and requirements are necessary for minimizing such problems, are subsequently presented.