References
- Brower E., Ertekin E., Christou C.A., O'Keefe S., “The Application of Header Compression to IPsec Encrypted Networks”, Military Communications Conference, 2005. MILCOM 2005. Vol. 5, pp. 2844- 2850, IEEE 17-20 Oct. 2005 https://doi.org/10.1109/MILCOM.2005.1606095
- Chen Zhuo, Chen Xiao-Wei, Zhang Zheng-Wen, Yang Mu-Xiang, “The Improving of IKE in WLAN”, Wireless Communications, Networking and Mobile Computing 2005. Proceedings. 2005 International Conference, Vol. 2, 23-26, pp. 1128-1131, Sept. 2005 https://doi.org/10.1109/WCNM.2005.1544251
- Christian Vogt, Roland Bless, Mark Doll, Tobias Kuefner, “Early Binding Updates for Mobile IPv6”, Wireless Communications and Networking Conference, 2005 IEEE, Vol. 3, 13-17, pp. 1440-1445, Mar. 2005 https://doi.org/10.1109/WCNC.2005.1424727
- C. Vogt, J. Arkko, R. Bless, M. Doll, and T. Kuefner., “Early Binding Updates for Mobile IPv6”, Internet Draft draft-vogt-mip6-early-binding-updates, Feb. 2004 https://doi.org/10.1109/WCNC.2005.1424727
- C. Vogt, J. Arkko, R. bless, M. Doll, and T. Kuefner., “Credit-Based Authorization for Mobile IPv6 Early Binding Updates”, Internet Draft draft-ietf-send-cga, May. 2004
- C. Bormann, C, Burmeister, M. Degermark, “RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed”, RFC 3095, July. 2001
- Changwen Liu, Soliman, H., “Local Key Exchange for Mobile IPv6 Local Binding Security Association”, Vehicular Technology Conference, 2004. VTC 2004- Spring. 2004 IEEE 59th, Vol. 5, 17-19, pp. 2647- 2655, May. 2004 https://doi.org/10.1109/VETECS.2004.1391401
- Chin-Fu Kuo, Chi-Ying Chen, Chi-Sheng Shih, Tei- Wei Kuo, “Threat-Based Configuration Architecture for Security Gateways”, Networks, 2006. ICON '06. 14th IEEE International Conference, Vol. 1, pp. 1-6, Sept. 2006 https://doi.org/10.1109/ICON.2006.302564
- Chih-Mou Shih, Shang-Juh Kao, “Security Gateway for Accessing IPv6 WLAN”, Computer and Information Science, 2006. ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference, pp. 83-88, July. 10-12, 2006 https://doi.org/10.1109/ICIS-COMSAR.2006.76
- C. Bormann, “Robust Header Compression (ROHC) over PPP” RFC 3241, Apr. 2002
- D. Taylor, A. Herkersdorf, A. Doring, G. Dittmann, “Robust Header Compression (RoHC) in Next-Generation Network Processors”, IEEE/ACM Transactions on Networking, Vol. 13, NO. 4, Aug. 2005 https://doi.org/10.1109/TNET.2005.852887
- D. Harkins and D. Carrel, “The Internet Key Exchange Protocol”, IETF RFC 2409, 1998
- D. Johnson, C. E. Perkins, and J. Arkko., “Mobility Support in IPv6”, RFC 3775, June. 2004
- E. Ertekin, C. Christou, B. Allen Hamilton, “Internet Protocol Header Compression, Robust Header Compression, and Their Applicability in the Global Information Grid”, IEEE Communication Magazine, Nov. 2004 https://doi.org/10.1109/MCOM.2004.1362553
- E. Martinez, A. Minaburo, L. Toutain, “RoHC for Multicast Distribution Services”, IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, 2005 https://doi.org/10.1109/PIMRC.2005.1651702
- Eltoweissy, M., Moharrum, M., Mukkamala, R., “Dynamic key management in sensor networks”, Communications Magazine, IEEE, Vol. 44, Issue 4, pp. 122-130, Apr. 2006 https://doi.org/10.1109/MCOM.2006.1632659
- G. O'Shea and M. Roe, “Child-Proof Authentication for MIPv6 (CAM)”, SIGCOMM Comput. Commun. Rev., Vol. 31, NO. 2, pp. 4-8, 2001 https://doi.org/10.1145/505666.505668
- J. Vilhuber, “IP Header Compression in IPSec ES”, Internet draft, draft-vilhuber-hcoesp-01.txt, July. 2004
- R. Deng, J. Zhou, and F. Bao, “Defending against Redirect Attacks in Mobile IP”, Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, pp. 59-67, Washington, DC, Nov. 2002 https://doi.org/10.1145/586110.586120
- Tin-Yu Wu, Chi-Hsiang Lo and Han-Chieh Chao, “Early Security Key Exchange for Encryption in Mobile IPv6 Handoff”, Security and Communication Networks, Volume 1 Issue 6, pp. 511–520, October. 2008 https://doi.org/10.1002/sec.62
Cited by
- Improved IPsec performance utilizing transport-layer-aware compression architecture vol.4, pp.9, 2011, https://doi.org/10.1002/sec.257
- SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks vol.7, pp.1, 2013, https://doi.org/10.1109/JSYST.2012.2209276