2005
DOI: 10.17487/rfc4225
|View full text |Cite
|
Sign up to set email alerts
|

Mobile IP Version 6 Route Optimization Security Design Background

Abstract: Mobile IP Version 6 Route Optimization Security Design Background Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
70
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 101 publications
(70 citation statements)
references
References 9 publications
0
70
0
Order By: Relevance
“…The Home Address destination option could be used to direct response traffic toward a node whose IP address appears in the option. In this case, ingress filtering would not catch the forged "return address" [36,32].…”
Section: Iana Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Home Address destination option could be used to direct response traffic toward a node whose IP address appears in the option. In this case, ingress filtering would not catch the forged "return address" [36,32].…”
Section: Iana Considerationsmentioning
confidence: 99%
“…For further information about the design rationale of the return routability procedure, see [27,34,33,32]. The mechanisms used have been adopted from these documents.…”
Section: Overviewmentioning
confidence: 99%
“…In fact, a malicious peer host may be intentionally giving bogus addresses in order to cause a packet flood towards the target addresses [RFC4225]. Therefore, the HIP host needs to first check that the peer is reachable at the new address.…”
Section: Address Verificationmentioning
confidence: 99%
“…Therefore, consistency between GIST and network routing state has to be ensured by directly interacting with the IP routing mechanisms to ensure that the signalling peers are the appropriate ones for any given flow. An overview of security issues and techniques in this context is provided in [37].…”
Section: Routing State Integritymentioning
confidence: 99%