Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as w...

Full description

Bibliographic Details
Main Authors: Supriyanto Praptodiyono, Teguh Firmansyah, Mudrik Alaydrus, M. Iman Santoso, Azlan Osman, Rosni Abdullah
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/5429630
id doaj-15a7af933e604e479e6092aefd1c3cd3
record_format Article
spelling doaj-15a7af933e604e479e6092aefd1c3cd32020-11-25T03:46:30ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/54296305429630Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A SurveySupriyanto Praptodiyono0Teguh Firmansyah1Mudrik Alaydrus2M. Iman Santoso3Azlan Osman4Rosni Abdullah5Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaElectrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaElectrical Engineering Department, Universitas Mercu Buana, Jakarta, IndonesiaElectrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, IndonesiaSchool of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaNational Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, MalaysiaInternet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.http://dx.doi.org/10.1155/2020/5429630
collection DOAJ
language English
format Article
sources DOAJ
author Supriyanto Praptodiyono
Teguh Firmansyah
Mudrik Alaydrus
M. Iman Santoso
Azlan Osman
Rosni Abdullah
spellingShingle Supriyanto Praptodiyono
Teguh Firmansyah
Mudrik Alaydrus
M. Iman Santoso
Azlan Osman
Rosni Abdullah
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
Security and Communication Networks
author_facet Supriyanto Praptodiyono
Teguh Firmansyah
Mudrik Alaydrus
M. Iman Santoso
Azlan Osman
Rosni Abdullah
author_sort Supriyanto Praptodiyono
title Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
title_short Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
title_full Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
title_fullStr Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
title_full_unstemmed Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
title_sort mobile ipv6 vertical handover specifications, threats, and mitigation methods: a survey
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.
url http://dx.doi.org/10.1155/2020/5429630
work_keys_str_mv AT supriyantopraptodiyono mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
AT teguhfirmansyah mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
AT mudrikalaydrus mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
AT mimansantoso mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
AT azlanosman mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
AT rosniabdullah mobileipv6verticalhandoverspecificationsthreatsandmitigationmethodsasurvey
_version_ 1715120848459792384