Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Distributed authentication protocol for the security of binding updates in mobile IPv6
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
An analysis of security threats to mobile IPv6
International Journal of Internet Protocol Technology
Security in Distributed Applications
Advances in Software Engineering
An experimental evaluation of a HIP based network mobility scheme
WWIC'08 Proceedings of the 6th international conference on Wired/wireless internet communications
Experiences with host-to-host IPsec
Proceedings of the 13th international conference on Security protocols
Fast inter-domain mobility with in-packet bloom filters
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
MIPv6 binding update protocol secure against both redirect and dos attacks
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
SP'04 Proceedings of the 12th international conference on Security Protocols
Formal approaches to location management in mobile communications
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Protocol analysis for concrete environments
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Wireless Personal Communications: An International Journal
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |
In the Mobile IPv6 protocol, the mobile node sendsbinding updates to its correspondents to inform themabout its current location. It is well-known that the originof this location information must be authenticated. Thispaper discusses several threats created by locationmanagement that go beyond unauthentic location data. Inparticular, the attacker can redirect data to bomb thirdparties and induce unnecessary authentication. Weintroduce and analyze protection mechanisms with focuson ones that work for all Internet nodes and do not need aPKI or other new security infrastructure. Our threatanalysis and assessment of the defense mechanismsformed the basis for the design of a secure locationmanagement protocol for Mobile IPv6. Many of the samethreats should be considered when designing any locationmanagement mechanism for open networks.