{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:59:04Z","timestamp":1743055144179,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319298139"},{"type":"electronic","value":"9783319298146"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29814-6_22","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T09:04:46Z","timestamp":1457341486000},"page":"269-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility"],"prefix":"10.1007","author":[{"given":"Hongwei","family":"Meng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziqian","family":"Meng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chuck","family":"Song","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"key":"22_CR1","unstructured":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011\u20132016"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Wakikawa, R., Zhang, L.: A survey of mobility support in the internet, RFC 6301, July, 2011","DOI":"10.17487\/rfc6301"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Perkins, C.: IP mobility support for IPv4, RFC 3344 (2002)","DOI":"10.17487\/rfc3220"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6, RFC 3775 (2004)","DOI":"10.17487\/rfc3775"},{"issue":"3\u20134","key":"22_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/BF03219911","volume":"61","author":"T Aura","year":"2006","unstructured":"Aura, T., Roe, M.: Designing the mobile IPv6 security protocol. Ann. Telecommun. 61(3\u20134), 332\u2013356 (2006)","journal-title":"Ann. Telecommun."},{"key":"22_CR6","unstructured":"Mankin, A., Patil, B., Harkins, D. et al.: Threat models introduced by mobile IPv6 and requirements for security in mobile IPv6 draft-ietf-mobile-ip-mipv6-scrty-reqts-02, Expired IETF Internet draft, November 2001"},{"key":"22_CR7","unstructured":"Shea, G., Roe, M.: Child-Proof Authentication for MIPv6 (CAM), Computer Communications Review, April 2001"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA) RFC 3972, March 2005","DOI":"10.17487\/rfc3972"},{"key":"22_CR9","unstructured":"Roe, M., Aura, T., OShea, G., Arkko, J.: Authentication of Mobile IPv6 Binding Updates and Acknowledgments, draftroe-mobileip-updateauth-02.txt, Expired IETF Intenet draft (2002)"},{"key":"22_CR10","unstructured":"Haddad, W., Madour, L., Arkko, J., Dupont, F.: Applying Cryptographically Generated Addresses to Optimize MIPv6 (CGAOMIPv6), draft-haddad-mip6-cga-omipv6-03, Expired IETF Internet draft (2004)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Arkko, J., Vogt, C., Haddad, W.: Enhanced Route Optimization for Mobile IPv6, RFC 4866 (2007)","DOI":"10.17487\/rfc4866"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Deng, R., Zhou, J., Bao, F.: Defending against redirect attacks in mobile IP. In: Proceedings of the of 9th ACM Conference on Computer and Communications Security (CCS), Washington, pp. 59\u201367 (2002)","DOI":"10.1145\/586110.586120"},{"key":"22_CR13","unstructured":"Kuang, S., Elz, R., Kamolphiwong, S.: Investigating enhanced route optimization for mobile IPv6. In: 13th Asia-Pacific on Computer Systems Architecture Conference(ACSAC 2008), Hsinchu (2008)"},{"key":"22_CR14","unstructured":"XIA Project (2013). http:\/\/www.cs.cmu.edu\/~xia\/"},{"key":"22_CR15","unstructured":"NSF Future Internet Architecture Project Next Phase (2014). http:\/\/www.nets-fia.net\/"},{"issue":"3","key":"22_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2656877.2656885","volume":"44","author":"D Naylor","year":"2014","unstructured":"Naylor, D., Mukerjee, M.K., et al.: XIA: architecting a more trustworthy and evolvable internet. ACM SIGCOMM Comput. Commun. 44(3), 50\u201357 (2014)","journal-title":"ACM SIGCOMM Comput. Commun."},{"key":"22_CR17","unstructured":"Han, D., Anand, A. et al.: XIA: Efficient Support for Evolvable Internetworking. In: The 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, 25\u201327 April 2012"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Anand, A., Dogar, F., Han, D. et al.: XIA: an architecture for an evolvable and trustworthy internet. In: Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, November, 2011","DOI":"10.1145\/2070562.2070564"},{"issue":"7","key":"22_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2011.5936152","volume":"49","author":"Jianli Pan","year":"2011","unstructured":"Pan, J., Paul, S., Jain, R.: A survey of the research on future internet architectures. IEEE Communications Magazine, July 2011","journal-title":"IEEE Communications Magazine"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29814-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T06:16:51Z","timestamp":1623824211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-29814-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319298139","9783319298146"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29814-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}