International Journal of Soft Computing

Year: 2018
Volume: 13
Issue: 1
Page No. 1 - 5

Secured Transmission for PMIPv6 Based Network Mobility using PlGPA Protocol

Authors : S. Kayaivizhi and M. Ponnavaikko

References

Bellardo, J. and S. Savage, 2003. 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. Proceedings of the 2003 USENIX Symposium on Security Vol. 12, August 4-8, 2003, USENIX Association, Berkeley, California, pp: 1-2.

Deshmukh, L.R. and A.D. Potgantwar, 2015. Ensuring an early recognition and avoidance of the vampire attacks in WSN using routing loops. Proceedings of the 2015 IEEE International Conference on Advance Computing Conference (IACC’15), June 12-13, 2015, IEEE, Banglore, India, ISBN:978-1-4799-8048-2, pp: 61-66.

Lee, J.H., T. Ernst and N. Chilamkurti, 2012. Performance analysis of pmipv6-based network mobility for intelligent transportation systems. IEEE Trans. Veh. Technol., 61: 74-85.
CrossRef  |  Direct Link  |  

Peris-Lopez, P., J.C. Hernandez-Castro, J.M. Estevez-Tapiador and A. Ribagorda, 2006. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. Ubiquitous Intell. Comput. Lecture Notes in Comput. Sci., 4159: 912-923.
CrossRef  |  

Ryu, S., K.J. Park and J.W. Choi, 2004. Enhanced fast handover for network mobility in intelligent transportation systems. IEEE. Trans. Veh. Technol., 63: 357-371.
CrossRef  |  Direct Link  |  

Senan, S., M. Ismail and K. Jumari, 2008. A comparison of mobile node’s handoff between mobile IPv6 and fast handover protocol. J. Inst. Eng. Malaysia, 69: 27-30.

Vasserman, E.Y. and N. Hopper, 2013. Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE. Trans. Mob. Comput., 12: 318-332.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved