2019
DOI: 10.30534/ijatcse/2019/20852019
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Vertical Handover Security Attacks during Execution Phase

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…It has been concluded in [2] that the VHO non-security based category takes a large portion of previous works (93%) compared with the VHO security based category (7%). Where, the majority works of this modest percentage of VHO security based category have mainly focused on the role of security parameter in selecting the best available RAT [3].…”
Section: Related Workmentioning
confidence: 99%
“…It has been concluded in [2] that the VHO non-security based category takes a large portion of previous works (93%) compared with the VHO security based category (7%). Where, the majority works of this modest percentage of VHO security based category have mainly focused on the role of security parameter in selecting the best available RAT [3].…”
Section: Related Workmentioning
confidence: 99%
“…Although the AD is prevalent option between companies, a few of them know how to use it effectively and securely [1]. Besides, both of IPv4 and IPv6 are still vulnerable to the security threats [3].…”
Section: A Comprehensive Analysis Of the Ad Vs Non-admentioning
confidence: 99%
“…2. Some security issues have been surveyed in [46]: fragmentation, header manipulation, smurf (broadcast amplification), host initialization and reconnaissance. Besides eavesdropping, DoS, spoofing, MITM, falsification and ransomware in [47][48][49][50][51] and [52], respectively.…”
Section: Introductionmentioning
confidence: 99%