{"id":"https://openalex.org/W3047558139","doi":"https://doi.org/10.1155/2020/5429630","title":"Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey","display_name":"Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey","publication_year":2020,"publication_date":"2020-08-04","ids":{"openalex":"https://openalex.org/W3047558139","doi":"https://doi.org/10.1155/2020/5429630","mag":"3047558139"},"language":"en","primary_location":{"id":"doi:10.1155/2020/5429630","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5429630","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5429630.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/5429630.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032784403","display_name":"Supriyanto Praptodiyono","orcid":"https://orcid.org/0000-0002-0047-9539"},"institutions":[{"id":"https://openalex.org/I3130588412","display_name":"Sultan Ageng Tirtayasa University","ror":"https://ror.org/05dmr4w13","country_code":"ID","type":"education","lineage":["https://openalex.org/I3130588412"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Supriyanto Praptodiyono","raw_affiliation_strings":["Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia","institution_ids":["https://openalex.org/I3130588412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081394723","display_name":"Teguh Firmansyah","orcid":null},"institutions":[{"id":"https://openalex.org/I3130588412","display_name":"Sultan Ageng Tirtayasa University","ror":"https://ror.org/05dmr4w13","country_code":"ID","type":"education","lineage":["https://openalex.org/I3130588412"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Teguh Firmansyah","raw_affiliation_strings":["Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia","institution_ids":["https://openalex.org/I3130588412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071821254","display_name":"Mudrik Alaydrus","orcid":"https://orcid.org/0000-0002-2195-1230"},"institutions":[{"id":"https://openalex.org/I177671886","display_name":"Mercu Buana University","ror":"https://ror.org/00qjgk605","country_code":"ID","type":"education","lineage":["https://openalex.org/I177671886"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Mudrik Alaydrus","raw_affiliation_strings":["Electrical Engineering Department, Universitas Mercu Buana, Jakarta, Indonesia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Universitas Mercu Buana, Jakarta, Indonesia","institution_ids":["https://openalex.org/I177671886"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090149646","display_name":"Muhammad Iman Santoso","orcid":null},"institutions":[{"id":"https://openalex.org/I3130588412","display_name":"Sultan Ageng Tirtayasa University","ror":"https://ror.org/05dmr4w13","country_code":"ID","type":"education","lineage":["https://openalex.org/I3130588412"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"M. Iman Santoso","raw_affiliation_strings":["Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia","institution_ids":["https://openalex.org/I3130588412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059100622","display_name":"Azlan Osman","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azlan Osman","raw_affiliation_strings":["School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051571958","display_name":"Rosni Abdullah","orcid":"https://orcid.org/0000-0002-3061-5837"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rosni Abdullah","raw_affiliation_strings":["National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5032784403"],"corresponding_institution_ids":["https://openalex.org/I3130588412"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.4524,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.82067503,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7982289791107178},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.7654559016227722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6569837331771851},{"id":"https://openalex.org/keywords/mobile-ip","display_name":"Mobile IP","score":0.5688439011573792},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5178756713867188},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49593982100486755},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.490866482257843},{"id":"https://openalex.org/keywords/vertical-handover","display_name":"Vertical handover","score":0.4750016927719116},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4735894799232483},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.4403395354747772},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4381035566329956},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3303583264350891},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2042998969554901},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14308398962020874},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13049161434173584},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.0975695252418518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7982289791107178},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.7654559016227722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6569837331771851},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.5688439011573792},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5178756713867188},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49593982100486755},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.490866482257843},{"id":"https://openalex.org/C2778863105","wikidata":"https://www.wikidata.org/wiki/Q7922836","display_name":"Vertical handover","level":5,"score":0.4750016927719116},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4735894799232483},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.4403395354747772},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4381035566329956},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3303583264350891},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2042998969554901},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14308398962020874},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13049161434173584},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.0975695252418518}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/5429630","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5429630","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5429630.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:15a7af933e604e479e6092aefd1c3cd3","is_oa":true,"landing_page_url":"https://doaj.org/article/15a7af933e604e479e6092aefd1c3cd3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/5429630","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5429630","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5429630.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3047558139.pdf","grobid_xml":"https://content.openalex.org/works/W3047558139.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W1964202131","https://openalex.org/W1969303351","https://openalex.org/W1981975771","https://openalex.org/W1990557017","https://openalex.org/W2012026594","https://openalex.org/W2013380562","https://openalex.org/W2014517769","https://openalex.org/W2023071906","https://openalex.org/W2034204268","https://openalex.org/W2040144912","https://openalex.org/W2044304742","https://openalex.org/W2063792093","https://openalex.org/W2063862901","https://openalex.org/W2068157146","https://openalex.org/W2100453372","https://openalex.org/W2102356633","https://openalex.org/W2106738713","https://openalex.org/W2115566176","https://openalex.org/W2133061584","https://openalex.org/W2137985720","https://openalex.org/W2142100695","https://openalex.org/W2142283510","https://openalex.org/W2166230138","https://openalex.org/W2169187196","https://openalex.org/W2317766129","https://openalex.org/W2333324699","https://openalex.org/W2750691772","https://openalex.org/W2768306887","https://openalex.org/W3025761109","https://openalex.org/W3105108969","https://openalex.org/W4251118802","https://openalex.org/W4251642962"],"related_works":["https://openalex.org/W3183475654","https://openalex.org/W2245568988","https://openalex.org/W2237022168","https://openalex.org/W2377723824","https://openalex.org/W2131950972","https://openalex.org/W2344103605","https://openalex.org/W2561470322","https://openalex.org/W2370141073","https://openalex.org/W2125400560","https://openalex.org/W2352561958"],"abstract_inverted_index":{"Internet":[0,17,91],"users":[1,122],"have":[2,163,172],"grown":[3],"substantially":[4],"over":[5],"the":[6,11,31,37,69,73,90,102,180,189,197,218,236,256],"last":[7],"decade,":[8],"especially":[9],"following":[10],"emergence":[12],"of":[13,40,136,153,183,199,232,238,244,258],"mobile":[14,23,49,103,118,132,142,161,184,200,248],"technology.":[15],"Most":[16],"connections":[18],"nowadays":[19],"are":[20,51,111,221,229],"accessed":[21],"using":[22],"devices":[24,50,133,143],"in":[25,134,146,151,178,224,230],"order":[26,147],"to":[27,36,53,61,107,113,123,148,234],"stay":[28],"connected":[29],"all":[30],"time":[32],"and":[33,139,188,204],"everywhere.":[34],"Owing":[35],"limited":[38],"coverage":[39],"such":[41],"access":[42],"points":[43],"as":[44,46,89,127,129,208,210],"well":[45,128,209],"base":[47],"stations,":[48],"required":[52],"handover":[54,65,81,187,203,251],"connectivity":[55],"if":[56],"there":[57,77,220],"is":[58,66,71,86,92,144,253],"a":[59],"move":[60,106],"other":[62],"locations.":[63],"Horizontal":[64],"conducted":[67],"when":[68,82],"movement":[70],"within":[72],"same":[74],"network.":[75],"Otherwise,":[76],"must":[78],"be":[79],"vertical":[80,186,202,250],"external":[83,109],"network":[84,95,110],"infrastructure":[85],"encountered.":[87],"However,":[88],"an":[93,108],"open":[94,242],"that":[96,105,228],"naturally":[97],"lacks":[98],"trust":[99],"between":[100],"users,":[101],"nodes":[104,119,162],"susceptible":[112],"various":[114],"attacking":[115],"activities.":[116,240],"Compromising":[117],"may":[120],"cause":[121],"lose":[124],"their":[125,131],"data":[126],"destroy":[130],"terms":[135,152],"both":[137],"software":[138],"hardware.":[140],"Securing":[141],"crucial":[145],"avoid":[149],"losses":[150],"not":[154],"only":[155],"money":[156],"but":[157],"also":[158],"facilities.":[159],"Although":[160],"been":[164],"developed":[165],"with":[166],"certain":[167],"security":[168,181,206,211,226,252],"features,":[169],"some":[170],"researchers":[171],"found":[173],"vulnerabilities.":[174],"This":[175],"paper":[176],"surveys":[177],"detail":[179],"vulnerabilities":[182],"IPv6":[185,201,249],"current":[190,225],"relevant":[191],"mitigation":[192],"methods.":[193],"Furthermore,":[194],"we":[195],"describe":[196],"mechanism":[198],"its":[205],"vulnerability":[207],"mechanisms":[212],"proposed":[213],"by":[214],"researchers.":[215],"Based":[216],"on":[217,247],"survey,":[219],"apparently":[222],"weaknesses":[223],"features":[227],"need":[231],"solutions":[233],"minimize":[235],"effect":[237],"malicious":[239],"An":[241],"direction":[243],"future":[245],"research":[246],"elaborated":[254],"at":[255],"end":[257],"this":[259],"paper.":[260]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
