{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:04Z","timestamp":1750307824232,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,10]],"date-time":"2007-09-10T00:00:00Z","timestamp":1189382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,10]]},"DOI":"10.1145\/1378063.1378113","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"296-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Route optimization schemes in mobile networks"],"prefix":"10.1145","author":[{"given":"Sahibzada Ahmed","family":"Noor","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecom, Beijing, China"}]},{"given":"Kashif Azim","family":"Janjua","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecom, Beijing, China"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecom, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2007,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Thierry Ernst Alexis Olivereau Ludovic Bellier Claude Castelluccia Hong-Yon Lach \"Mobile Networks Support in Mobile IPv6 (Prefix Scope Binding Updates)\" IETF Draft draft-ernst-mobileip-v6-network-03 March 2002  Thierry Ernst Alexis Olivereau Ludovic Bellier Claude Castelluccia Hong-Yon Lach \"Mobile Networks Support in Mobile IPv6 (Prefix Scope Binding Updates)\" IETF Draft draft-ernst-mobileip-v6-network-03 March 2002"},{"key":"e_1_3_2_1_2_1","volume-title":"RFC","author":"Johnson D.","year":"2004","unstructured":"Johnson , D. , Perkins , C., and J. Arkko , \" Mobility Support in IPv6 \", RFC 3775, June 2004 Johnson, D., Perkins, C., and J. Arkko, \"Mobility Support in IPv6\", RFC 3775, June 2004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"T. Ernst H-Y. Lach \"Network Mobility Support Terminology draft-ietf-NEMO-terminology-06\" IETF Draft November 9 2006  T. Ernst H-Y. Lach \"Network Mobility Support Terminology draft-ietf-NEMO-terminology-06\" IETF Draft November 9 2006","DOI":"10.17487\/rfc4885"},{"key":"e_1_3_2_1_4_1","volume-title":"November 8","author":"Ernst Network Mobility","year":"2006","unstructured":"T. Ernst , \" Network Mobility Support Goals and Requirements\", IETF Draft , draft-ietf-NEMO-requirements-06 , November 8 , 2006 T. Ernst, \"Network Mobility Support Goals and Requirements\", IETF Draft, draft-ietf-NEMO-requirements-06, November 8, 2006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"C. Perkins \"IP Mobility Support for IPv4\" RFC 3344 Aug 2002   C. Perkins \"IP Mobility Support for IPv4\" RFC 3344 Aug 2002","DOI":"10.17487\/rfc3220"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"V. Devarapalli R. Wakikawa P. Thubert \"Network Mobility (NEMO) Basic Support Protocol\" RFC 3963 January 2005  V. Devarapalli R. Wakikawa P. Thubert \"Network Mobility (NEMO) Basic Support Protocol\" RFC 3963 January 2005","DOI":"10.17487\/rfc3963"},{"key":"e_1_3_2_1_7_1","volume-title":"RFC","author":"Manner J.","year":"2004","unstructured":"Manner , J. and M. Kojo , \" Mobility Related Terminology \", RFC 3753, June 2004 Manner, J. and M. Kojo, \"Mobility Related Terminology\", RFC 3753, June 2004"},{"key":"e_1_3_2_1_8_1","volume-title":"RFC","author":"Conta A.","year":"1998","unstructured":"Conta , A. and S. Deering , \" Generic Packet Tunneling in IPv6 Specification \", RFC 2473, December 1998 Conta, A. and S. Deering, \"Generic Packet Tunneling in IPv6 Specification\", RFC 2473, December 1998"},{"key":"e_1_3_2_1_9_1","unstructured":"Petrescu A. Olivereau A. Janneteau C. and H-Y. Lach \"Threats for Basic Network Mobility Support (NEMO threats)\" draft-petrescu-NEMO-threats-01 January 2004  Petrescu A. Olivereau A. Janneteau C. and H-Y. Lach \"Threats for Basic Network Mobility Support (NEMO threats)\" draft-petrescu-NEMO-threats-01 January 2004"},{"key":"e_1_3_2_1_10_1","unstructured":"Jung S. Zhao F. Wu S. Kim H-G. and S-W. Sohn \"Threat Analysis on NEMO Basic Operations\" draft-jung-NEMO-threat-analysis-02 July 2004  Jung S. Zhao F. Wu S. Kim H-G. and S-W. Sohn \"Threat Analysis on NEMO Basic Operations\" draft-jung-NEMO-threat-analysis-02 July 2004"},{"key":"e_1_3_2_1_11_1","unstructured":"Thubert P. Wakikawa R. and V. Devarapalli \"NEMO Home Network Models\" draft-ietf-NEMO-network-models-06 February 2006  Thubert P. Wakikawa R. and V. Devarapalli \"NEMO Home Network Models\" draft-ietf-NEMO-network-models-06 February 2006"},{"key":"e_1_3_2_1_12_1","unstructured":"Manabu Tsukada et al \"Dynamic Management of Multiple Mobile Routers\" IEEE 2005  Manabu Tsukada et al \"Dynamic Management of Multiple Mobile Routers\" IEEE 2005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.875116"},{"volume-title":"Int. Workshop","author":"Perera OptiNets","key":"e_1_3_2_1_14_1","unstructured":"E. Perera , et al \" OptiNets : An architecture to enable optimal routing for network mobility,\" in Proc . Int. Workshop E. Perera, et al \"OptiNets: An architecture to enable optimal routing for network mobility,\" in Proc. Int. Workshop"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2003.1191606"},{"key":"e_1_3_2_1_16_1","unstructured":"Wakikawa R. and M. Watari \"Optimized Route Cache Protocol (ORC)\" draft-wakikawa-NEMO-orc-00 July2004.  Wakikawa R. and M. Watari \"Optimized Route Cache Protocol (ORC)\" draft-wakikawa-NEMO-orc-00 July2004."},{"key":"e_1_3_2_1_17_1","volume-title":"November 1","author":"Kniveton Jari T","year":"2002","unstructured":"T. J. Kniveton , Jari T . Malinen , Vijay Devarapalli , Charles E . Perkins , \" Mobile Router Tunneling Protocol\", IETF Draft , draft-kniveton-mobrtr-03.txt , November 1 , 2002 T. J. Kniveton, Jari T. Malinen, Vijay Devarapalli, Charles E. Perkins, \"Mobile Router Tunneling Protocol\", IETF Draft, draft-kniveton-mobrtr-03.txt, November 1, 2002"},{"key":"e_1_3_2_1_18_1","volume-title":"April","author":"Na J.","year":"2004","unstructured":"Na , J. , Cho , S., Kim , C. , Lee , S. , Kang , H. , and C. Koo , \" Route Optimization Scheme based on Path Control Header\", draft-na-NEMO-path-control-header-00 , April 2004 . Na, J., Cho, S., Kim, C., Lee, S., Kang, H., and C. Koo, \"Route Optimization Scheme based on Path Control Header\", draft-na-NEMO-path-control-header-00, April 2004."},{"key":"e_1_3_2_1_19_1","unstructured":"Thubert P. and M. Molteni \"IPv6 Reverse Routing Header and its application to Mobile Networks\" draft-thurbert-NEMO-reverse-routing-header-05 June 2005  Thubert P. and M. Molteni \"IPv6 Reverse Routing Header and its application to Mobile Networks\" draft-thurbert-NEMO-reverse-routing-header-05 June 2005"},{"key":"e_1_3_2_1_20_1","unstructured":"P. Thubert and N. Montavont \"Nested Nemo tree discovery \" IETF draft-thubert-tree-discovery-01.txt Oct. 2004  P. Thubert and N. Montavont \"Nested Nemo tree discovery \" IETF draft-thubert-tree-discovery-01.txt Oct. 2004"},{"key":"e_1_3_2_1_21_1","unstructured":"Ng C. and T. Tanaka \"Securing Nested Tunnels Optimization with Access Router Option\" draft-ng-NEMO-access-router-option-01 July 2004  Ng C. and T. Tanaka \"Securing Nested Tunnels Optimization with Access Router Option\" draft-ng-NEMO-access-router-option-01 July 2004"},{"key":"e_1_3_2_1_22_1","unstructured":"H. Cho et al \"RBU+: Recursive binding update for end-to-end route optimization in nested mobile networks \" in Lecture  H. Cho et al \"RBU+: Recursive binding update for end-to-end route optimization in nested mobile networks \" in Lecture"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.875110"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.875109"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.875113"},{"key":"e_1_3_2_1_26_1","first-page":"68","volume-title":"May 2005 on Wireless Ad-Hoc Networks","author":"Nikander P.","year":"2004","unstructured":"Nikander , P. , \"Mobile IP version 6 Route Optimization Security Design Background\" , draft-ietf-mip6-ro-sec-03 , May 2005 on Wireless Ad-Hoc Networks , May 2004 , pp. 68 -- 72 . Notes in Computer Science (LNCS) . Berlin, Germany : Springer-Verlag , Jun. 2004, vol. 3079 , pp. 468--478. September 2006 Nikander, P., \"Mobile IP version 6 Route Optimization Security Design Background\", draft-ietf-mip6-ro-sec-03, May 2005 on Wireless Ad-Hoc Networks, May 2004, pp. 68--72. Notes in Computer Science (LNCS). Berlin, Germany: Springer-Verlag, Jun. 2004, vol. 3079, pp. 468--478. September 2006"}],"event":{"name":"MC07: 4th Mobility Conference: International Conference on Mobile Technology, Application & Systems","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","Singapore Polytechnic"],"location":"Singapore","acronym":"MC07"},"container-title":["Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378063.1378113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:50Z","timestamp":1750255070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378113"}},"subtitle":["a theoretical and empirical analysis"],"short-title":[],"issued":{"date-parts":[[2007,9,10]]},"references-count":26,"alternative-id":["10.1145\/1378063.1378113","10.1145\/1378063"],"URL":"https:\/\/doi.org\/10.1145\/1378063.1378113","relation":{},"subject":[],"published":{"date-parts":[[2007,9,10]]},"assertion":[{"value":"2007-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}