Review Article
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
Table 1
Summary of infrastructure-based security.
| Infrastructure-based security | Basic operations | Main strength | Main weakness |
| CBU [86] | Authenticate an MN and its CoA using a certificate | Public key certificate uses Diffie–Hellman algorithm | It does not address the HoA certificate management | HCBU [103–105] | Trust delegation | Enhancing security against malicious flooding attacks | Signalling overhead | TBU [106] | The ticket is used to assist BU generation | Fully synchronized clocks between the two communication nodes | Open to flooding attacks targeting the CN | ETBU [107] | The address generated using CGA | It minimizes the loss of network traffic | Heavy calculation | SROP [87] | Authentication based on the signature and keyed hash of the message | A security association is also established for the secure connection | Does not fully protect Mobile IPv6 communication from various attacks | RR-IBE [108, 109] | The keys are distributed to all senders simultaneously | The attacks in return routability have been addressed by this method | Introduces a high latency based on the usage of an infrastructure-based PKG | CLPKE [110] | Both the latest location and new location is informed to the HA or CN | Providing less cost of BU messages | This protocol requires trusted third party |
|
|