Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

被引:6
|
作者
Praptodiyono, Supriyanto [1 ]
Firmansyah, Teguh [1 ]
Alaydrus, Mudrik [2 ]
Santoso, M. Iman [1 ]
Osman, Azlan [3 ]
Abdullah, Rosni [4 ]
机构
[1] Univ Sultan Ageng Tirtayasa, Elect Engn Dept, Banten, Indonesia
[2] Univ Mercu Buana, Elect Engn Dept, Jakarta, Indonesia
[3] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
[4] Univ Sains Malaysia, Natl Adv IPv6 Ctr, George Town, Malaysia
关键词
RETURN ROUTABILITY PROTOCOL; ENHANCED FAST HANDOVER; SECURITY; NETWORKS; MIPV6; AUTHENTICATION; ENCRYPTION; MANAGEMENT; ATTACKS;
D O I
10.1155/2020/5429630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey
    Ahmed, Amjed Sid Ahmed Mohamed Sid
    Hassan, Rosilah
    Othman, Nor Effendy
    IEEE ACCESS, 2017, 5 : 18187 - 18210
  • [2] Survey of Authentication in Mobile IPv6 Network
    Sun, Huiping
    Song, Junde
    Chen, Zhong
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 1170 - +
  • [3] Performance Evaluation of Vertical Handover for IEEE 802.21 Enabled Proxy Mobile IPv6
    Pandey, Dinesh
    Bashir, Faisal
    Kee, Guen-Young
    Pyun, Jae-Young
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2013, : 27 - 31
  • [4] A Survey on IPv6 Security Threats and Defense Mechanisms
    Liu, Ning
    Xia, Jing
    Cai, Zhiping
    Yang, Tao
    Hou, Bingnan
    Wang, Zhilin
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT I, 2022, 13338 : 583 - 598
  • [5] Performance analysis of fast handover for proxy Mobile IPv6
    Kim, Mun-Suk
    Lee, SuKyoung
    Cypher, David
    Golmie, Nada
    INFORMATION SCIENCES, 2013, 219 : 208 - 224
  • [6] Multicast based Proxy Mobile IPv6 for inter-domain handover
    Kim, Chaehwan
    Hwang, Hyunwoo
    Baik, Jung-Woo
    Lee, Kyung-Geun
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2863 - 2872
  • [7] An enhanced fast handover triggering mechanism for Fast Proxy Mobile IPv6
    Zhang, Lei
    Tian, Yu-Chu
    WIRELESS NETWORKS, 2018, 24 (02) : 513 - 522
  • [8] Ipv6 Change Threats Behavior
    Najjar, Firas
    El-Taj, Homam
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 63 - 68
  • [9] SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
    Chuang, Ming-Chin
    Lee, Jeng-Farn
    Chen, Meng-Chang
    IEEE SYSTEMS JOURNAL, 2013, 7 (01): : 102 - 113
  • [10] Roadmap of Security threats between IPv4/IPv6
    Abusafat, Fadi
    Pereira, Tiago
    Santos, Henrique
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 566 - 571