A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates.
Il-Sun YouKyungsan ChoPublished in: ICCSA (1) (2004)
Keyphrases
- mobile ipv
- wireless networks
- heterogeneous networks
- mobile nodes
- network layer
- wireless lan
- cryptographic protocols
- trusted third party
- security protocols
- mobility management
- information security
- mobile networks
- security properties
- intrusion detection
- authentication protocol
- security policies
- access control
- wireless sensor
- security mechanisms
- security analysis
- wireless communication
- sensor networks
- elliptic curve
- key management
- data dissemination
- wireless sensor networks
- wifi
- security requirements
- mobile ad hoc networks
- network security