Security Enhancement of Route Optimization in Mobile IPv6 Networks
Mobile IPv6 is an IP-layer protocol that is designed to provide mobility support.It allows an IPv6 node to arbitrarily change its location in the IPv6 network while maintaining the existing connection by handling the change of addresses at the Internet layer. Route optimization is standard in Mobile...
| Main Author: | Zare Anari, Abbas Mehdizadeh |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5411/ http://psasir.upm.edu.my/id/eprint/5411/1/FK_2008_39.pdf |
Similar Items
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012)
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Path recovery for ad-hoc on-demamd distance 6lowpan routing protocol
by: Ee, Gee Keng
Published: (2013)
by: Ee, Gee Keng
Published: (2013)
Handover enhancement in IP mobility for 6LoWPAN scenario
by: Abdulrahman, Ahmed Faris
Published: (2016)
by: Abdulrahman, Ahmed Faris
Published: (2016)
A Matrix Usage for Load Balancing in Shortest Path Routing
by: Mustafa, Nor Musliza
Published: (2009)
by: Mustafa, Nor Musliza
Published: (2009)
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
by: Al-Kharasani, Nori Mohammed Abdulkarem
Published: (2020)
by: Al-Kharasani, Nori Mohammed Abdulkarem
Published: (2020)
Qos-Aware Handover Scheme for Hierarchical Mobile Ipv6 Using Context Transfer with Link Layer Trigger
by: N. Pillay, Shamini Pillay
Published: (2004)
by: N. Pillay, Shamini Pillay
Published: (2004)
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018)
by: Shehu, Aliyu Usman
Published: (2018)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
by: Sjaugi, Muhammad Farhan
Published: (2008)
by: Sjaugi, Muhammad Farhan
Published: (2008)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
Hypergraph-based resource allocation in wireless mesh networks
by: Abbas, Bashar Khudhair
Published: (2017)
by: Abbas, Bashar Khudhair
Published: (2017)
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
An investigation and simulation of novel dynamic routing methods
by: Saleh, Mohammad
Published: (2001)
by: Saleh, Mohammad
Published: (2001)
Hexagonal grid-based dynamic routing adjustment for optimising network lifetime in wireless sensor network
by: Jarallah, Zaid Fawaz
Published: (2017)
by: Jarallah, Zaid Fawaz
Published: (2017)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Improved tree routing protocol in zigbee networks
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
Enhanced Mobility Solution In Mobile Ipv6 Network
by: David, Adeniji Oluwashola
Published: (2008)
by: David, Adeniji Oluwashola
Published: (2008)
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
Traffic Balancing Method in Shortest Path Routing
by: Mohamed Abdulqader, Makarem
Published: (2007)
by: Mohamed Abdulqader, Makarem
Published: (2007)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
by: Hossen, Md.Jakir
Published: (2003)
by: Hossen, Md.Jakir
Published: (2003)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Multi agent quality of service routing based on scheme ant colony optimization algorithm
by: Baygi, Maassoumeh Javadi
Published: (2014)
by: Baygi, Maassoumeh Javadi
Published: (2014)
A simulative study on the performance evaluation for simultaneous and successive mobility for mobile IPv6
by: Abdullah, Ibrahim, et al.
Published: (2010)
by: Abdullah, Ibrahim, et al.
Published: (2010)
Micro-Mobility Enhancement in Multicast Mobile Ipv6 Wireless Networks
by: Yong, Chu Eu
Published: (2006)
by: Yong, Chu Eu
Published: (2006)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
by: Elangkovan, Sri Ganesh
Published: (2018)
by: Elangkovan, Sri Ganesh
Published: (2018)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Performance enhancement of AIMD algorithm for congestion avoidance and control
by: Jasem, Hayder Natiq
Published: (2011)
by: Jasem, Hayder Natiq
Published: (2011)
Similar Items
-
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
by: Saleh, Ahmed Mohammed Shamsan
Published: (2012) -
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015) -
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011) -
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019) -
Path recovery for ad-hoc on-demamd distance 6lowpan routing protocol
by: Ee, Gee Keng
Published: (2013)