Universiti Teknologi Malaysia Institutional Repository

Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6

Alizadeh, Mojtaba and Zamani, Mazdak and Baharun, Sabariah and Hassan, Wan Haslina and Khodadadi, Touraj (2015) Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6. Jurnal Teknologi, 72 (5). pp. 27-30. ISSN 0127-9696

Full text not available from this repository.

Official URL: http://dx.doi.org/10.11113/jt.v72.3935

Abstract

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.

Item Type:Article
Uncontrolled Keywords:proxy mobile IPv6, security and privacy
Subjects:T Technology > T Technology (General)
Divisions:Malaysia-Japan International Institute of Technology
ID Code:55388
Deposited By: Muhamad Idham Sulong
Deposited On:04 Sep 2016 02:20
Last Modified:01 Nov 2017 04:16

Repository Staff Only: item control page