Autor: | C. Vogt, J. Kempf | Links: | DownloadBibtex |
---|---|---|---|
Quelle: | August 2006 | ||
This document discusses security threats to network-based localized mobility management. Threats may occur on two interfaces: the interface between an LMA and a MAG, as well as the interface between a MAG and a mobile node. Threats to the former interface impact the localized mobility management protocol itself.