2017
DOI: 10.1016/j.pmcj.2016.08.013
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…These include • IP-based: This includes authentication mechanisms followed by the majority of mobile applications as it uses proxy procedures to support the security of nodes in smart M-IoT. PMIPv6 and F-PMIPv6 are among the popular solutions for secure and seamless handovers [146], [157], [295], [296]. • Reliability-based: Approaches like [158], [297], which not only provides strong authentication but also supports the reliability of connections, are studied under this category.…”
Section: Property-basedmentioning
confidence: 99%
“…These include • IP-based: This includes authentication mechanisms followed by the majority of mobile applications as it uses proxy procedures to support the security of nodes in smart M-IoT. PMIPv6 and F-PMIPv6 are among the popular solutions for secure and seamless handovers [146], [157], [295], [296]. • Reliability-based: Approaches like [158], [297], which not only provides strong authentication but also supports the reliability of connections, are studied under this category.…”
Section: Property-basedmentioning
confidence: 99%
“…Architecture-based Property-based Host-initiated [263] Network-initiated [264] Centralized [265] Distributed [264], [266] IP-based [129], [140], [267], [268] Reliabilty-based [141], [269] Encryption-based [129], [269], [270] Uniform [271], [272] Media-Independent [273], [274] Fig. 13.…”
Section: Initiation-basedmentioning
confidence: 99%
“…• IP-based: This includes authentication mechanisms followed by the majority of mobile applications as it uses proxy procedures to support the security of nodes in smart M-IoT. PMIPv6 and F-PMIPv6 are among the popular solutions for secure and seamless handovers [129], [140], [267], [268]. • Reliability-based: Approaches like [141], [269], which not only provides strong authentication but also supports the reliability of connections, are studied under this category.…”
Section: B Architecture-basedmentioning
confidence: 99%
“…The way toward distinguishing the PoC in allocation system to convey information bundles is recognizing as area the board [6]. Then again, the way toward keeping up the supporter association with least corruption in Quality of Service (QoS) [7], for example parcel misfortune, start to finish delay and so on., is recognize as handover the board [8,9]. The MN encounters the handover at whatever point it moves starting with one system then onto the next.…”
Section: Introductionmentioning
confidence: 99%