|Autor:||C. Vogt, J. Kempf||Links:||DownloadBibtex|
This document discusses security threats to network-based localized mobility management. Threats may occur on two interfaces: the interface between an LMA and a MAG, as well as the interface between a MAG and a mobile node. Threats to the former interface impact the localized mobility management protocol itself.