Domenico Celentano, A. Fresa, M. Longo, F. Postiglione, A. Robustelli
{"title":"B3G网络的安全移动IPv6","authors":"Domenico Celentano, A. Fresa, M. Longo, F. Postiglione, A. Robustelli","doi":"10.1109/SOFTCOM.2006.329773","DOIUrl":null,"url":null,"abstract":"The rapid spread of new radio access technologies, the ever increasing requirements for security, as well as the required capability for the final users to experience continuous connectivity and uninterrupted services of IP applications as they move about from one access network to another, has stimulated the technical and scientific community to investigate future evolution scenarios for 3G networks, generically referred to as Beyond-3G or 4G. Key issues are certainly security provision for applications exchanging data in diverse wireless networks and seamless mobility (handoff) between different coverage domains and, possibly, access technologies. Many proposals are based on the use of the mobile IPv6 protocol. In this paper we analyse the security threats emerging from some MIPv6 mechanisms for mobility management, and we propose a solution to secure them, under the assumption that both communicating end users are attached to a MIPv6-enabled IP multimedia subsystem network","PeriodicalId":292242,"journal":{"name":"2006 International Conference on Software in Telecommunications and Computer Networks","volume":"210 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure Mobile IPv6 for B3G Networks\",\"authors\":\"Domenico Celentano, A. Fresa, M. Longo, F. Postiglione, A. Robustelli\",\"doi\":\"10.1109/SOFTCOM.2006.329773\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid spread of new radio access technologies, the ever increasing requirements for security, as well as the required capability for the final users to experience continuous connectivity and uninterrupted services of IP applications as they move about from one access network to another, has stimulated the technical and scientific community to investigate future evolution scenarios for 3G networks, generically referred to as Beyond-3G or 4G. Key issues are certainly security provision for applications exchanging data in diverse wireless networks and seamless mobility (handoff) between different coverage domains and, possibly, access technologies. Many proposals are based on the use of the mobile IPv6 protocol. In this paper we analyse the security threats emerging from some MIPv6 mechanisms for mobility management, and we propose a solution to secure them, under the assumption that both communicating end users are attached to a MIPv6-enabled IP multimedia subsystem network\",\"PeriodicalId\":292242,\"journal\":{\"name\":\"2006 International Conference on Software in Telecommunications and Computer Networks\",\"volume\":\"210 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-09-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Software in Telecommunications and Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOFTCOM.2006.329773\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Software in Telecommunications and Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOFTCOM.2006.329773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The rapid spread of new radio access technologies, the ever increasing requirements for security, as well as the required capability for the final users to experience continuous connectivity and uninterrupted services of IP applications as they move about from one access network to another, has stimulated the technical and scientific community to investigate future evolution scenarios for 3G networks, generically referred to as Beyond-3G or 4G. Key issues are certainly security provision for applications exchanging data in diverse wireless networks and seamless mobility (handoff) between different coverage domains and, possibly, access technologies. Many proposals are based on the use of the mobile IPv6 protocol. In this paper we analyse the security threats emerging from some MIPv6 mechanisms for mobility management, and we propose a solution to secure them, under the assumption that both communicating end users are attached to a MIPv6-enabled IP multimedia subsystem network