參考文獻 |
參考文獻
[Abob99] B. Aboba and M. Beadles, “The Network Access Identifier,” IETF RFC2486, Jan.1999.
[Adra03] F. Adrangi et al., “Problem Statement: Mobile IPv4 Traversal of VPN Gateways,” Internet-Draft,IETF Mobile IP Working Group, April 2003, access from http:// www.ietf.org/internet-drafts/draft-ietf-mobileip-vpn-problem-statement-req-02.
[Burr90] Burrows M., Abadi, M. and Needham R.,“A Logic of Authentication”, access from http://www.cs.utexas.edu/users/dahlin/Classes/GradOS/papers/p18-burrows.pdf at JAN 2003.
[Bart02] M. Barton et al., “Integration of IP Mobility and Security for Secure WirelessCommunications,” IEEE International Conference on Communications, ICC 2002, Volume: 2, 2002, Page(s): 1045 –1049.
[Brad97] Bob Braden et al.,“Resource ReSerVation Protocol (RSVP)-version 1 Functional Specification,” RFC 2205,Network working Group, September 1997, access from http://www.ietf.org/rfc/rfc2205.txt.
[Caro00] Andrea De Carolis et al.,“QoS-Aware handover for Mobile IP:Secondary Home Agent,”April,2002, access from
http://www.watersprings.org/pub/id/draft-decarolis-qoshandover-02.txt.
[Calh00] P. Calhoun and C. Perkins , “Mobile IP Network Access Identifier Extension forIPv4,” RFC 2794, January 2000.
[Danz01]Danzeisen, “ Secure Mobile IP Communication,” Diploma Thesis, Institute of Computer Science and Applied Mathematics, University of Bern, May 2001.
[Deng02] R.H. Deng, J. Zhou and F. Bao, “ Defending Against Redirect Attacks in MobileIP”, Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002, ACM Press, Page(s): 59—67.
[Deer91] S. Deering,“ICMP Router Discovery Messages,” RFC 1256, IETF Network Working Group, September 1991.
[Gupt98] V.Gupta and G. Montenegro, “Secure and mobile networking,” Mobile Networksand Applications 3, 1998, Page(s): 381–390.
[Hank94] S. Hanks, T.Li, D. Farinacci, and P.Traina,“Generic Routing Encapsulation(GRE),” RFC 1701,October 1994.
[John03]F. Johansson and T. Johansson,“AAA NAI for Mobile IPv4 Extension,”March 2003, access from www.ietf.org/internet-drafts/draft-ietf-mobileip-aaa-nai-05.txt.
[John00] David and Johnson,“Mobile IP in the Current and Future Internet,” Tutorial for MobiCom, 2000.
[Jaco97] S. Jacob and G. Cirincione, “Security of Current Mobile IP Solutions,” Proceedings of MILCOM 97, Vol. 3,1997, Page(s): 1122 –1128.
[Mink00] S. Mink, F. Pahlke, G. Schafer and J. Schiller, “Towards secure mobility support forIP networks,” Proceedings of International Conference on CommunicationTechnology, WCC-ICCT 2000, Volume: 1, 2000, Page(s): 555 –562.
[Ohza02] Satoshi Ohzahata, Shigetomo Kimura and Yoshihiko Ebihara,“A Fast Authentication Method for Secure and Seamless Handoff, ”6th International
Conference on Information Networking 30 Jan.-2 Feb., 2002.
[Park97]C. Park,“On Certificate-Based Security Protons for Wireless Mobile Communication Systems,” IEEE Network, Oct. 1997,Page(s): 50–55.
[Perk03] C. E. Perkins et al., “AAA Registration Keys for Mobile IP”, Internet-Draf, IETFMobile IP Working Group, 22 May 2003, access from http://www.ietf.org/internet-drafts/ draft-ietf-mobileip-aaa-key-12.txt.
[Perk02]C.E., Perkins, “Mobile IP Support for IPv4,” IETF RFC 3344,Aug. 2002.
[Perk01] C. Perkins et al.,“Route Optimization in Mobile IP,”IETF Internet Draft, draft-ietf-mobileip-optim-11.tx, Sep 2001.
[Perk00] C.E., Perkins, “Mobile IP joins forces with AAA,” IEEE Personal Communications [see also IEEE Wireless Communications], Aug. 2000.
[Perk9a] C.E. Perkins, “Mobile IP and security issue: an overview,” Proceeding of FirstIEEE/Popov Workshop on Internet Technologies and Services, 1999,Page(s):131 –148.
[Perk9b] C. E. Perkins and Kuang-Yeh Wang , “Optimized Smooth Handoffs in Mobile IP,”Proceedings of the Fourth IEEE Symposium on Computers and Communications,July,1999.
[Perk97] C.E., Perkins, “Mobile IP,” IEEE Communications Magazine, May 1997, Vol.35 Issue: 5, Page(s): 84 –99.
[Perk6a]C. Perkins, “IP Encapsulation within IP,” RFC 2003, October 1996.
[Perk6b]C. Perkins, “Minimal Encapsulation within IP,” RFC 2004, October 1996.
[Scha01] G. Schaefer, A. festag and H. Karl, “Current Approaches to Authenticationin Mobile and Wireless Communications,”Technical University Berlin Tele- communications Networks Group, Version 1.0, 26/03 2001.
[Solo98]James D. Solomon, “Mobile IP: The Internet Unplugged, Prentice Hall,” 1998.
[Stal99] William Stallings, “Cryptography and Network Security: Principles and Practice, Second Edition,” PRENTICE HALL, INC, 1999.
[Stil01] B. Stiller, L. Kacnelson, C.E. Perkins and P. Dini,“Mobility in a future Internet , ” Proceedings of 26th Annual IEEE Conference on Local Computer Networks, LCN 2001, 2001, Page(s): 24 –30.
[Stin95] D. Stinson, “Cryptography: Theory and Practice”, Boca Raton, L: CRC Press, 1995.
[Sufa99] Sufatrio and Yan Lam Kook, “Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication,” Proceedings of FourthInternational Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN '99), Perth/Fremantle, Australia, 23-25 Jun,1999,Page(s): 364 –369.
[Wang01]H. Wang and S. Zheng, “The security issues and countermeasures in MobileIP,” Proceeding of IEEE International Conference on Info-tech and Info-net, Vol. 5, Beijing, 29 Dec – 1 Nov, 2001, Page(s): 122 –127.
[Wu2002] Chun-Hsin Wu et al., “ Bi-Directional Route Optimization in Mobile IP over Wireless LAN, ” Proceedings of 56th IEEE Vehicular Technology Conference, VTC 2002-Fall. 2002, Volume: 2, 2002,Page(s): 1168 –1172.
[Zao997] J.Zao et al., “A Public-Key Based Secure Mobile IP,” MOBICOM ’97, 1997,Page(s):173 –184. |