A security protocol for authentication of binding updates in Mobile IPv6.

0044 English OPEN
Georgiades, Andrew;

Wireless communication technologies have come along way, improving with every generational leap. As communications evolve so do the system architectures, models and paradigms. Improvements have been seen in the jump from 2G to 3G networks in terms of security. Yet these... View more
  • References (1)

    Table 1. Table of Simulations Run ......................................................................................................118  Table 2. Simulation Results of Packets Sent/Received .......................................................................121  Table 3. Simulation Results of Packets Sent/Received .......................................................................122  Table 4. Simulation Results of Min/Max Hop Count .........................................................................123  Table 5. Simulation Results of Min/Max Hop Count .........................................................................124  Table 6. Simulation Results Showing Packet Data on Second Network............................................124 

  • Metrics
Share - Bookmark