Review Article
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
Algorithm 1
There are three phases in the protocol as follows [
115].
| Phase 1: | | Step 1: create a private key | | Step 2: create a public key | | Step 3: create an interface ID | | Phase 2: | | Step 1: combine MNHoA and MNCoA | | Step 2: encrypt the message using CN public key | | Step 3: use a digital signature to sign the message | | Phase 3: | | Step 1: authenticate the signature | | Step 2: confidentiality of data | | Step 3: integrity of data | | Step 4: ownership and reachability |
|