Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

[HTML][HTML] Ip security (ipsec) and internet key exchange (ike) document roadmap

S Frankel, S Krishnan - 2011 - rfc-editor.org
RFC 6071: IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Internet Engineering …

RFC 3775: Mobility support in IPv6

D Johnson, C Perkins, J Arkko - 2004 - dl.acm.org
This document specifies a protocol which allows nodes to remain reachable while moving
around in the IPv6 Internet. Each mobile node is always identified by its home address …

Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey

S Praptodiyono, T Firmansyah… - Security and …, 2020 - Wiley Online Library
Internet users have grown substantially over the last decade, especially following the
emergence of mobile technology. Most Internet connections nowadays are accessed using …

[HTML][HTML] Mobile IPv6 operation with IKEv2 and the revised IPsec architecture

V Devarapalli, F Dupont - 2007 - rfc-editor.org
RFC 4877: Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture [RFC Home]
[TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist …

Vitality of robotics in healthcare industry: an Internet of Things (IoT) perspective

AR Patel, RS Patel, NM Singh, FS Kazi - Internet of things and big data …, 2017 - Springer
Since last two decade robotics is one of the emerging, challenging, developing and
innovative fields of research among researchers, industries universities. It is very difficult to …

Method and system for providing access-specific key

R Falk, G Horn, D Kröselberg - US Patent 9,197,615, 2015 - Google Patents
An access specific key is provided for securing of a data transfer between a mobile terminal
and a node of an access net. For authentication of the mobile terminal, a authentica tion …

{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014 - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

Measuring and improving the performance of network mobility management in IPv6 networks

H Petander, E Perera, KC Lan… - IEEE Journal on …, 2006 - ieeexplore.ieee.org
Measuring the performance of an implementation of a set of protocols and analyzing the
results is crucial to understanding the performance and limitations of the protocols in a real …

Methods and apparatus for achieving route optimization and location privacy in an IPV6 network

A Patel, K Leung, G Dommety - US Patent 7,840,217, 2010 - Google Patents
Methods and apparatus for performing proxy registration on behalf of a node with a Home
Agent supporting Mobile IP are disclosed. A first registration request is composed on behalf …