Security analysis and enhanced user authentication in proxy mobile IPv6 networks

D Kang, J Jung, D Lee, H Kim, D Won - PloS one, 2017 - journals.plos.org
network to another without changing the assigned IPv6 address. The user authentication
accepted threat model concerning user authentication and key agreement scheme [21–23]. …

Implementation of IPv6 functions for a network user authentication system opengate

M Otani, K Eguchi, H Eto, K Watanabe… - … conference on User …, 2005 - dl.acm.org
… and using a network user authentication system called "Opengate" This system has functions
for user authentication and access control according to the authentication and logging of …

[图书][B] Understanding ipv6

J Davies - 2012 - books.google.com
use this book as an in-depth primer on IPv6 technologies. … ; analysis of IPv6 network traffic
with Network Monitor (based on … , data authentication, and replay protection for the entire IPv6

Identity-based hierarchical access authentication in mobile IPv6 networks

Y Tian, Y Zhang, H Zhang, Z Li - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
… is the users who want to access networks should be authenticated. … authentication scheme
for wireless mobile IPv6 networks. Instead of using certificate to achieve mutual authentication

An access control architecture for microcellular wireless IPv6 networks

S Schmid, J Finney, M Wu, A Friday… - … Computer Networks, 2001 - ieeexplore.ieee.org
… of secure user authentication, packet marking, and network-… network guided with our
access control system, a user's end-terminal requires our Mobile IPv6 stack extension, The user

Cryptanalysis and improvement of" a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

M Alizadeh, M Zamani, S Baharun, A Abdul Manaf… - PloS one, 2015 - journals.plos.org
… The details of user authentication … in the IPv6 network. This standardized protocol allows
the mobile devices to roam inside the network by providing seamless connection to the network. …

SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks

MC Chuang, JF Lee, MC Chen - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
… In this paper, we use a one-way hash function to ensure that information cannot be modified.
Therefore, this attack will be detected because an attacker has no way to obtain the value of …

IPv6 security issues—A systematic review

A Shiranzaei, RZ Khan - Next-Generation Networks: Proceedings of CSI …, 2018 - Springer
… by some attacks while IPv6 security methods are without authentication, confidentiality, and
… as a legitimate user to inject traffic in the tunnel by spoofing internal IPv6 and external IPv4 …

A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things

L Chom Thungon, N Ahmed… - Transactions on …, 2021 - Wiley Online Library
… A remote user authenticationauthentication was established between the user, sensor
node, and gateway. The four-step authentication scheme starts with the user authenticating with …

Security and privacy criteria to evaluate authentication mechanisms in proxy mobile ipv6

M Alizadeh, M Zamani, S Baharun, WH Hassan… - Jurnal …, 2015 - journals.utm.my
… in IPv6 network. This standard permits mobile devices to travel between networks by keeping
mobile nodes connected to the network. … process is the verifying device's identity or a user's