An optimized and secure BUTE - binding update using twofold encryption for next generation IP mobility

[1]  Mohamed Othman,et al.  Mobility management for IP-based next generation mobile networks: Review, challenge and perspective , 2012, J. Netw. Comput. Appl..

[2]  Rosli Salleh,et al.  A survey of secure protocols in Mobile IPv6 , 2014, J. Netw. Comput. Appl..

[3]  Jianhua Li,et al.  A Novel Key Exchange Protocol Based on RSA-OAEP , 2008, 2008 10th International Conference on Advanced Communication Technology.

[4]  Javier Carmona-Murillo,et al.  Analytical and Experimental Evaluation of Handovers in IPv6 Mobility Management Protocols , 2016, Netw. Protoc. Algorithms.

[5]  Hitesh Tewari,et al.  Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[6]  Rosli Salleh,et al.  Securing Binding Update in Mobile IPv6 Using Private Key Base Binding Update Protocol , 2012, ArXiv.

[7]  Victor Shoup,et al.  OAEP Reconsidered , 2002, Journal of Cryptology.

[8]  Senthilkumar Mathi,et al.  A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility , 2015 .

[9]  Senthilkumar Mathi,et al.  A Tokenized Binding Update Scheme for Next Generation Proxy IP Mobility , 2016 .

[10]  Kuinam J. Kim,et al.  Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks , 2014, Wirel. Pers. Commun..

[11]  Debashis Saha,et al.  Implementation and performance evaluation of a mobile IPv6 (MIPv6) simulation model for ns-3 , 2017, Simul. Model. Pract. Theory.

[12]  C. K. Shyamala,et al.  Adversarial Effect in Distributed Storage Systems , 2016 .

[13]  Davide Schipani,et al.  The Rabin cryptosystem revisited , 2011, Applicable Algebra in Engineering, Communication and Computing.

[14]  Hongke Zhang,et al.  Survey on Route Optimization Schemes for Proxy Mobile IPv6 , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[15]  Wafaa A. H. Ali Alsalihy,et al.  Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6 , 2013, Wirel. Pers. Commun..

[16]  Lo-Yao Yeh,et al.  A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs , 2013, J. Netw. Comput. Appl..

[17]  Antonio de la Oliva,et al.  Distributed mobility management solutions for next mobile network architectures , 2017, Comput. Networks.

[18]  Senthilkumar Mathi,et al.  A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment , 2015 .

[19]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[20]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[21]  Jacques Stern,et al.  RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.

[22]  Ian F. Akyildiz,et al.  A survey of mobility management in next-generation all-IP-based wireless systems , 2004, IEEE Wirel. Commun..

[23]  Awadallah M. Ahmed,et al.  Enhancement of Seamless mobility in Nested Network Mobility , 2017, 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE).