Review Article

Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

Table 1

Summary of infrastructure-based security.

Infrastructure-based securityBasic operationsMain strengthMain weakness

CBU [86]Authenticate an MN and its CoA using a certificatePublic key certificate uses Diffie–Hellman algorithmIt does not address the HoA certificate management
HCBU [103105]Trust delegationEnhancing security against malicious flooding attacksSignalling overhead
TBU [106]The ticket is used to assist BU generationFully synchronized clocks between the two communication nodesOpen to flooding attacks targeting the CN
ETBU [107]The address generated using CGAIt minimizes the loss of network trafficHeavy calculation
SROP [87]Authentication based on the signature and keyed hash of the messageA security association is also established for the secure connectionDoes not fully protect Mobile IPv6 communication from various attacks
RR-IBE [108, 109]The keys are distributed to all senders simultaneouslyThe attacks in return routability have been addressed by this methodIntroduces a high latency based on the usage of an infrastructure-based PKG
CLPKE [110]Both the latest location and new location is informed to the HA or CNProviding less cost of BU messagesThis protocol requires trusted third party