Fast IPv6 network periphery discovery and security implications

X Li, B Liu, X Zheng, H Duan, Q Li… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Numerous measurement researches have been performed to discover the IPv4 network
security issues by leveraging the fast Internet-wide scanning techniques. However, IPv6 …

When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks

H Hong, H Choi, D Kim, H Kim, B Hong… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Recently, cellular operators have started migrating to IPv6 in response to the increasing
demand for IP addresses. With the introduction of IPv6, cellular middleboxes, such as …

[图书][B] Deploying IPv6 in 3GPP networks: evolving mobile broadband from 2G to LTE and beyond

J Korhonen, T Savolainen, J Soininen - 2013 - books.google.com
Deploying IPv6 in 3GPP Networks–Evolving Mobile Broadband from 2G to LTE and Beyond
A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely …

A qualitative analysis of secured handover management schemes for mobile IPv6 enabled networks

AK Tripathi, SK Tripathi - … on Power, Energy and Controls with …, 2018 - ieeexplore.ieee.org
Development in wireless technologies permits IPv6 enabled handheld mobile devices to
access the Internet ubiquitously. An IP-address is required to identify the mobile host on the …

Survey of IPv6 support in 3GPP specifications and implementations

J Soininen, J Korhonen - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
The growth in Internet usage has been phenomenal over the last decade. During the last
few years, more and more of this growth has come from mobile broadband access. The most …

Evolving the 3GPP bearer model towards multiple IPv6 prefixes and next-hop routers

J Korhonen, T Savolainen, G Wolfner… - Telecommunication …, 2015 - Springer
The 3GPP architecture is not particularly IPv6 friendly when it comes to handling of multiple
prefixes. The excess use of default bearers and related radio access bearers to mimic multi …

Unveiling confidentiality-related vulnerabilities in an IMS-based environment

E Ilyas, T Mazri, N Hmina - 2016 5th International Conference …, 2016 - ieeexplore.ieee.org
Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking
technology. This revolution of telecommunication network implementation methodology from …

[PDF][PDF] Recent Developments in Service Function Chaining

P Horvath, K Holzinger, H Stubbe - Network, 2021 - net.in.tum.de
A network's infrastructure consists of multiple network functions some of which may include
distinct intermediate steps that need to be applied in a particular order. In order to ensure the …

Investigation & Scrutiny of Protected Assignment Supervision Systems for Mobile Enabled with Internet Protocol Version 6 Networks

AB Sharma, H Kargeti - American Journal of Computer Science and …, 2020 - amjcst.net
Advancement in remote technologies advances the grants of Internet Protocol version 6
(IPv6) empowered handheld cell phones to get to the cyberspace globally. An Internet …

PMIPv6 route optimization for inter-and intra-domain roaming using signaling reduction approach in LTE networks

WK Jia - 2015 International Wireless Communications and …, 2015 - ieeexplore.ieee.org
Due to the increasing demand of wireless services, mobile access technology has quickly
progressed towards the fourth generation Long Term Evolution (LTE) networking paradigm …