{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T18:07:57Z","timestamp":1750442877900,"version":"3.40.5"},"reference-count":86,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T00:00:00Z","timestamp":1596499200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Education and Culture, Republic of Indonesia"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,8,4]]},"abstract":"<jats:p>Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.<\/jats:p>","DOI":"10.1155\/2020\/5429630","type":"journal-article","created":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T23:31:23Z","timestamp":1596583883000},"page":"1-18","source":"Crossref","is-referenced-by-count":9,"title":["Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0047-9539","authenticated-orcid":true,"given":"Supriyanto","family":"Praptodiyono","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"}]},{"given":"Teguh","family":"Firmansyah","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"}]},{"given":"Mudrik","family":"Alaydrus","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universitas Mercu Buana, Jakarta, Indonesia"}]},{"given":"M. Iman","family":"Santoso","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universitas Sultan Ageng Tirtayasa, Banten, Indonesia"}]},{"given":"Azlan","family":"Osman","sequence":"additional","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"}]},{"given":"Rosni","family":"Abdullah","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia"}]}],"member":"311","reference":[{"year":"2017","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.010"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6807945"},{"year":"2008","key":"5"},{"year":"2013","key":"6"},{"issue":"1","key":"7","first-page":"75","volume":"2","year":"2011","journal-title":"International Journal of Energy, Information and Communications"},{"volume":"2","journal-title":"RFC 3753","year":"2004","key":"8"},{"volume":"2","journal-title":"RFC 6275","year":"2011","key":"10"},{"volume":"2","journal-title":"RFC 8200","year":"2017","key":"12"},{"volume":"2","journal-title":"RFC 793","year":"1981","key":"13"},{"volume":"2","journal-title":"RFC 3775","year":"2004","key":"14"},{"volume":"2","journal-title":"RFC 4721","year":"2007","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2016.2558521"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/mprv.2008.6"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2007.4396947"},{"volume":"14","journal-title":"JWIS","year":"2009","key":"21"},{"volume-title":"Mobile IPv6 security","year":"2002","key":"23"},{"year":"2008","key":"24"},{"first-page":"332","volume-title":"Designing the mobile IPv6 security protocol","year":"2006","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.080"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2012.010912.00044"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2306210"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.07.013"},{"key":"32","first-page":"660","volume":"39","year":"2007","journal-title":"International Symposium on Communications and Information Technologies"},{"volume":"39","journal-title":"RFC 4862","year":"2007","key":"33"},{"year":"2004","key":"34"},{"volume":"39","journal-title":"RFC 5568","year":"2009","key":"37"},{"volume":"39","journal-title":"RFC 4886","year":"2007","key":"38"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1023\/a:1019033431871"},{"issue":"26","key":"42","volume":"17","year":"2016","journal-title":"Computer Communications"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.044"},{"issue":"1","key":"46","first-page":"362","volume":"2","year":"2013","journal-title":"International Journal of Innovations in Engineering and Technology"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2002.1024413"},{"issue":"6","key":"48","first-page":"76","volume":"13","year":"2013","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"issue":"1","key":"50","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/LCOMM.2006.1576570","volume":"10","year":"2006","journal-title":"IEEE Communications Letters"},{"key":"52","first-page":"234","volume":"8","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"volume":"8","journal-title":"WINSYS","year":"2008","key":"55"},{"issue":"1","key":"56","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MWC.2008.4454707","volume":"15","year":"2008","journal-title":"IEEE Wireless Communications"},{"year":"2003","key":"57"},{"volume":"8","journal-title":"AMS","year":"2015","key":"58"},{"year":"2007","key":"59"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.418"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.841"},{"volume":"30","journal-title":"RFC 4068","year":"2005","key":"64"},{"volume":"30","journal-title":"RFC 5268","year":"2008","key":"65"},{"volume":"30","journal-title":"RFC 5566","year":"2009","key":"66"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.11.005"},{"volume":"29","journal-title":"RFC 4140","year":"2005","key":"70"},{"volume":"29","journal-title":"RFC 5380","year":"2008","key":"71"},{"volume":"29","journal-title":"RFC 4389","year":"2014","key":"72"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2013.2272059"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2008.060582"},{"volume":"7","journal-title":"The Scientific World Journal","year":"2014","key":"76"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2007.02.002"},{"volume":"12","journal-title":"RFC 3756","year":"2004","key":"79"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.107341"},{"key":"81","doi-asserted-by":"crossref","first-page":"18187","DOI":"10.1109\/ACCESS.2017.2737524","volume":"5","year":"2017","journal-title":"IEEE Access"},{"key":"87","first-page":"27","volume":"9","year":"2009","journal-title":"International Journal of Computer and Network Security (IJCSNS)"},{"volume":"9","journal-title":"RFC 4303","year":"2005","key":"89"},{"volume":"9","journal-title":"RFC 4301","year":"2005","key":"90"},{"volume":"9","journal-title":"RFC 4302","year":"2005","key":"91"},{"volume":"9","journal-title":"RFC 4306","year":"2008","key":"92"},{"volume":"9","journal-title":"RFC 3776","year":"2004","key":"93"},{"volume":"9","journal-title":"RFC 4877","year":"2007","key":"94"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/563274"},{"volume":"10","journal-title":"Semantic Scholar","year":"2013","key":"96"},{"volume":"10","journal-title":"Information Networking Institute","year":"2000","key":"97"},{"volume":"10","journal-title":"RFC 7296","year":"2014","key":"99"},{"volume":"10","journal-title":"Mobile and Wireless Communications Summit","year":"2007","key":"100"},{"volume":"10","journal-title":"RFC 4225","year":"2005","key":"101"},{"key":"102","first-page":"437","volume":"10","year":"2009","journal-title":"Proceedings of World Academy of Science, Engineering and Technology"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.019"},{"issue":"5","key":"104","volume":"5","year":"2013","journal-title":"Computer Networks"},{"issue":"12","key":"105","first-page":"1633","volume":"4","year":"2012","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"volume":"4","journal-title":"International Conference on Embedded and Ubiquitous Computing","year":"2006","key":"106"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e90-b.4.777"},{"issue":"3","key":"108","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s11277-011-0474-5","volume":"68","year":"2013","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"109","first-page":"573","volume":"13","year":"2018","journal-title":"Journal of Engineering Science and Technology"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-017-0740-7"},{"key":"111","doi-asserted-by":"publisher","DOI":"10.1145\/505666.505668"},{"key":"112","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1113"},{"volume":"31","journal-title":"Wireless Communications and Networking Conference","year":"2005","key":"113"},{"key":"114","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/934286"},{"key":"115","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.14.0113.0177"},{"key":"117","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.1237.1246"},{"volume":"6","journal-title":"RFC 3972","year":"2005","key":"118"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5429630.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5429630.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5429630.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T23:31:35Z","timestamp":1596583895000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/5429630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,4]]},"references-count":86,"alternative-id":["5429630","5429630"],"URL":"https:\/\/doi.org\/10.1155\/2020\/5429630","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,8,4]]}}}