Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as w...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/5429630 |
id |
doaj-15a7af933e604e479e6092aefd1c3cd3 |
---|---|
record_format |
Article |
spelling |
doaj-15a7af933e604e479e6092aefd1c3cd32020-11-25T03:46:30ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/54296305429630Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A SurveySupriyanto Praptodiyono0Teguh Firmansyah1Mudrik Alaydrus2M. Iman Santoso3Azlan Osman4Rosni Abdullah5Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaElectrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaElectrical Engineering Department, Universitas Mercu Buana, Jakarta, IndonesiaElectrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaSchool of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaNational Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, MalaysiaInternet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.http://dx.doi.org/10.1155/2020/5429630 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Supriyanto Praptodiyono Teguh Firmansyah Mudrik Alaydrus M. Iman Santoso Azlan Osman Rosni Abdullah |
spellingShingle |
Supriyanto Praptodiyono Teguh Firmansyah Mudrik Alaydrus M. Iman Santoso Azlan Osman Rosni Abdullah Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey Security and Communication Networks |
author_facet |
Supriyanto Praptodiyono Teguh Firmansyah Mudrik Alaydrus M. Iman Santoso Azlan Osman Rosni Abdullah |
author_sort |
Supriyanto Praptodiyono |
title |
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey |
title_short |
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey |
title_full |
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey |
title_fullStr |
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey |
title_full_unstemmed |
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey |
title_sort |
mobile ipv6 vertical handover specifications, threats, and mitigation methods: a survey |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper. |
url |
http://dx.doi.org/10.1155/2020/5429630 |
work_keys_str_mv |
AT supriyantopraptodiyono mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey AT teguhfirmansyah mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey AT mudrikalaydrus mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey AT mimansantoso mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey AT azlanosman mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey AT rosniabdullah mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey |
_version_ |
1715120848459792384 |