Alizadeh, Mojtaba and Zamani, Mazdak and Baharun, Sabariah and Hassan, Wan Haslina and Khodadadi, Touraj (2015) Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6. Jurnal Teknologi, 72 (5). pp. 27-30. ISSN 0127-9696
Full text not available from this repository.
Official URL: http://dx.doi.org/10.11113/jt.v72.3935
Abstract
Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | proxy mobile IPv6, security and privacy |
Subjects: | T Technology > T Technology (General) |
Divisions: | Malaysia-Japan International Institute of Technology |
ID Code: | 55388 |
Deposited By: | Muhamad Idham Sulong |
Deposited On: | 04 Sep 2016 02:20 |
Last Modified: | 01 Nov 2017 04:16 |
Repository Staff Only: item control page