Security Threats to Network-based Localized Mobility Management
Author: C. Vogt, J. Kempf links:
Source: August 2006
This document discusses security threats to network-based localized mobility management. Threats may occur on two interfaces: the interface between an LMA and a MAG, as well as the interface between a MAG and a mobile node. Threats to the former interface impact the localized mobility management protocol itself.