Fig. 1. Mobile Node Mobility on MIPv6 : Mobile Node get care of address from Foreign Agent as moving to Foreign Agent area, and it happen Binding update exchange between Mobile Node and Correspond Node
Fig. 2. Message Sequence on MIPv6 including Two-way Auth.
Table 1. Comparison of protocols
References
- C. Perkins, D. Johnson & J. Arkko. (2011). Mobility support in IPv6. IETF RFC 6275.
- M. B. Yassein, S. Aljawarneh & W. Al-Sarayrah. (2017). Mobility Management of Internet of Things: Protocols, Challenges and Open Issues. IEEE ICEMIS 2017. DOI : 10.1109/ICEMIS.2017.8273021
- J. Montavont, D. Roth & T. Noel. (2014). Mobile IPv6 in Internet of Things: Analysis, experimentations and optimizations. Ad Hoc Networks, 14, 15-25. DOI :10.1016/j.adhoc.2013.11.001
- S. Choi & S. Koh. (2016). Use of Proxy Mobile IPv6 for Mobility Management in CoAP-based Internet-of-Things Networks. IEEE Communications Letters, 20(11), 2284-2287. DOI : 10.1109/LCOMM.2016.2601318
- IPSec : Security Architecture for the Internet Protocol, IETF RFC 4301.
- Internet Key Exchange (IKEv2) Protocol, IETF RFC 4306.
- G. S. Lee. (2002). http://www.tta.or.kr/data/reportDown.jsp?news_num=549
- G. Lee, S. Lee, J. Park & Y. Kim. Mobile IPv6 Security Issues and Solutions. http://kidbs.itfind.or.kr/WZIN/jugidong/1050/105001.htm
- M. Chuang, J. Lee. & M. Chen. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102-113. https://doi.org/10.1109/JSYST.2012.2209276
- J. Lee. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38-43. https://doi.org/10.1109/MWC.2016.7721740
- G. O'shea & M. Roe. (2001). Child-proof Authentication for MIPv6 (CAM). ACM Computer Couunications Review, 31(2), 4-8.