Review Article

Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

Figure 5

Connection hijacking attacks.