Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey

S Praptodiyono, T Firmansyah… - Security and …, 2020 - Wiley Online Library
Internet users have grown substantially over the last decade, especially following the
emergence of mobile technology. Most Internet connections nowadays are accessed using …

A comprehensive review of enhancements and prospects of fast handovers for mobile IPv6 protocol

MM Sajjad, D Jayalath, CJ Bernardos - IEEE Access, 2018 - ieeexplore.ieee.org
The emerging mobility management schemes for the fifth generation (5G) of mobile
networks mostly follow the network-based protocol principles, which do not involve the …

[PDF][PDF] Oscillating Supersonic delta wing with Straight Leading Edges

A Crasta, SA Khan - International Journal of Computational Engineering …, 2012 - Citeseer
A Supersonic similitude has been used to obtain stability derivatives in pitch and roll of a
delta wing with straight leading edge for the attached shock case. Ghosh's strip theory is …

Detecting NDP distributed denial of service attacks using machine learning algorithm based on flow-based representation

AA Alsadhan, A Hussain… - 2018 11th International …, 2018 - ieeexplore.ieee.org
the rapid growth of the Internet usage has caused problem on Internet protocol address
space. To solve the space issue of Internet Protocol version 4 addresses, Internet Protocol …

Exploring mobile health in a private online social network

QA Memon, AF Mustafa - International Journal of Electronic …, 2015 - inderscienceonline.com
Health information is very vulnerable. Certain individuals or corporate organisations will
continue to steal it similar to bank account data once data is on wireless channels. Once …

A review on implementation issues in IPv6 network technology

RC Meena, M Bundele - Ramesh,#, Meena, C., & Bundele, M …, 2015 - papers.ssrn.com
IPv4 addresses are already depleted in Internet Assigned Numbers Authority (IANA) and
have exhausted in Regional Internet Registries (RIRs) while more clients are continuously …

Detecting distributed denial of service attacks in neighbour discovery protocol using machine learning algorithm based on streams representation

AA Alsadhan, A Hussain, T Baker, O Alfandi - … Conference, ICIC 2018 …, 2018 - Springer
The main protocol of the Internet protocol version 6 suites is the neighbour discovery
protocol, which is geared towards substitution of address resolution protocol, router …

Integration of Firewall and IDS on Securing Mobile IPv6

S Praptodiyono, M Jauhari, R Fahrizal… - 2020 2nd …, 2020 - ieeexplore.ieee.org
The number of Mobile device users in the word has evolved rapidly. Many internet users
currently want to connect the internet for all utilities automatically. One of the technologies in …

Comparative analysis of security mechanism of mobile IPv6 threats against binding update, Route Optimization and Tunneling

AK Barbudhe, VK Barbudhe… - 2014 IEEE 6th …, 2014 - ieeexplore.ieee.org
Mobile IPv6 is a very important part in the mobile computing for global Internet. However,
there are some security threats in the current mobile IPv6 such as threats against binding …

[PDF][PDF] How Secure is the Next-Generation Internet? An Examination of IPv6.

A Herrera - 2013 - adrianherrera.github.io
The deployment of IPv6-aware networks is expected to increase significantly with the
exhaustion of the IPv4 address space. This report informs those involved in the deployment …