Mostrar el registro sencillo del ítem
dc.contributor.author | Modares, Hero | es_ES |
dc.contributor.author | Moravejosharieh, Amirhossein | es_ES |
dc.contributor.author | Lloret, Jaime | es_ES |
dc.contributor.author | Salleh, Rosli | es_ES |
dc.date.accessioned | 2015-06-29T17:45:48Z | |
dc.date.available | 2015-06-29T17:45:48Z | |
dc.date.issued | 2014-03 | |
dc.identifier.issn | 1084-8045 | |
dc.identifier.uri | http://hdl.handle.net/10251/52448 | |
dc.description.abstract | [EN] Mobile IPv6, also known as MIPv6, is an IP-layer protocol that offers mobility support. The MIPv6 protocol allows Mobile Nodes (MNs) to remain connected to Correspondent Nodes (CNs), even when moving to foreign networks. Basically, MNs may change their position throughout the IPv6 network while retaining their existing connections by managing address variations in the Internet layer. Numerous advantages are thus attained, but security remains a fundamental concern. According to our research, a number of protocols can form a secure connection environment between MNs and CNs, though each has advantages and disadvantages. This paper presents a state-of-the art survey of security protocols in MIPv6. Moreover, we propose taxonomy, and comparative study that does not exist in the surveys in the literature. Along with the location management feature within these protocols, potential attacks and security threats, together with the security services and requirements are necessary for minimizing such problems, are subsequently presented. (C) 2013 Elsevier Ltd. All rights reserved. | es_ES |
dc.description.sponsorship | This work was supported in part by the University of Malaya, Kuala Lumpur Malaysia under UMRG Grant (RG080/11ICT). | |
dc.language | Inglés | es_ES |
dc.publisher | Elsevier | es_ES |
dc.relation.ispartof | Journal of Network and Computer Applications | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | Mobile lEv6 | es_ES |
dc.subject | Binding update messages | es_ES |
dc.subject | Security threats | es_ES |
dc.subject | Authentication protocols in MIEv6 | es_ES |
dc.subject | Attacks in Mobile lEv6 | es_ES |
dc.subject.classification | INGENIERIA TELEMATICA | es_ES |
dc.title | A survey of secure protocols in Mobile IPv6 | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1016/j.jnca.2013.07.013 | |
dc.relation.projectID | info:eu-repo/grantAgreement/UM//RG080%2F11ICT/ | es_ES |
dc.rights.accessRights | Cerrado | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres | es_ES |
dc.description.bibliographicCitation | Modares, H.; Moravejosharieh, A.; Lloret, J.; Salleh, R. (2014). A survey of secure protocols in Mobile IPv6. Journal of Network and Computer Applications. 39:351-368. https://doi.org/10.1016/j.jnca.2013.07.013 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | http://dx.doi.org/10.1016/j.jnca.2013.07.013 | es_ES |
dc.description.upvformatpinicio | 351 | es_ES |
dc.description.upvformatpfin | 368 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 39 | es_ES |
dc.relation.senia | 287257 | |
dc.contributor.funder | University of Malaya, Kuala Lumpur |