Review Article

Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

Algorithm 1

There are three phases in the protocol as follows [115].
Phase 1:
 Step 1: create a private key
 Step 2: create a public key
 Step 3: create an interface ID
Phase 2:
 Step 1: combine MNHoA and MNCoA
 Step 2: encrypt the message using CN public key
 Step 3: use a digital signature to sign the message
Phase 3:
 Step 1: authenticate the signature
 Step 2: confidentiality of data
 Step 3: integrity of data
 Step 4: ownership and reachability