An authentication method for proxy mobile IPv6 and performance analysis

H Zhou, H Zhang, Y Qin - Security and Communication …, 2009 - Wiley Online Library
proxy MIPv6 authentication method. This paper proposes an authentication method in proxy
… In addition to providing access authentication, the proposed authentication method prevents …

An authentication protocol for proxy mobile IPv6

H Zhou, H Zhang - … The 4th International Conference on Mobile …, 2008 - ieeexplore.ieee.org
… of Proxy Mobile IPv6 authentication method. This paper proposes an authentication method
in Proxy Mobile IPv6. In … access authentication, the proposed authentication method prevents …

Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

M Alizadeh, S Baharun, M Zamani, T Khodadadi… - Jurnal …, 2015 - journals.utm.my
Proxy Mobile IPv6, a procedure for authentication is needed during the initial registration
process … issue of authentication methods suggested for the Proxy Mobile IPv6 network namely …

Security and privacy criteria to evaluate authentication mechanisms in proxy mobile ipv6

M Alizadeh, M Zamani, S Baharun, WH Hassan… - Jurnal …, 2015 - journals.utm.my
mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure
… threats; however, the details of authentication procedure is not specified in this standard. In …

Security analysis and enhanced user authentication in proxy mobile IPv6 networks

D Kang, J Jung, D Lee, H Kim, D Won - PloS one, 2017 - journals.plos.org
… of the Mobile Node (… authentication process of the MN is not properly specified. Therefore,
a lot of research have been proposed on the authentication process between MN and Mobile

A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol

AJ Jabir, S Shamala, Z Zuriati… - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
… handoff latency through simplifying the authentication procedure and to reduce the transmission
… the authentication and registration process to reduce handoff latency. This method has …

A survey on proxy mobile IPv6 handover

H Modares, A Moravejosharieh, J Lloret… - IEEE Systems …, 2014 - ieeexplore.ieee.org
… This can be use as a verification method for any duplication or spurious indications of the
MN or p-MAG. The host route is created to enable packets to be forwarded to the MN. A HAck …

Cryptanalysis and improvement of" a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

M Alizadeh, M Zamani, S Baharun, A Abdul Manaf… - PloS one, 2015 - journals.plos.org
… the security strengths of the authentication methods in the PMIPv6 using … authentication
method should fulfill some security and privacy criteria such as anonymity, mutual authentication, …

SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks

MC Chuang, JF Lee, MC Chen - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
Proxy Mobile IPv6 (PMIPv6) to support mobility management without the participation of mobile
… can be performed locally (ie, the authentication process is completed by the MAG without …

Security-effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks

I Im, YH Cho, JY Choi, J Jeong - … Science and Its Applications–ICCSA 2012 …, 2012 - Springer
… -authentication procedure, MR uses K key which is achieved from LAAA server in the first
authentication procedure. … executes authentication procedure instead of LAAA server to reduce …