Preventing Denial-of-service in Next Generation Internet Protocol Mobility Article Swipe
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.11591/ijeecs.v12.i1.pp137-146
Internet Protocol version 6 (IPv6) is a next-generation internet protocol that is devised to replace its predecessor, the IPv4. With the benefit of ample address space, flexible header extensions and its many specific features, IPv6 is the future of the Internet and Internetworking. A significant advantage of IPv6 is its capabilities in the domain of security and mobility, where it scores in comparison with its predecessor. One of the many features specific to IPv6, such as the mandatory IPsec messaging or address auto-configuration, is the Neighbor Discovery Protocol (NDP). Even though the concept of security is more pronounced in the IPv6 protocols, there still exist loopholes. These loopholes when exploited target the foundation of the Internetworking. The extensive applications of NDP make it even more necessary to identify and address these gaps to ensure network security. Hence, this paper investigates such loopholes in the applications of NDP in creating a network and analyzes the process of the denial-of-service attacks that endanger the safety of an established network. Also, the paper proposes a new method to mitigate Denial-of-Service (DoS) in network mobility of IPv6 networks. This proposed approach is a hybrid of existing solutions and is capable of overcoming the significant disadvantages of these methods. Also, the paper discusses the comparative analysis among the various existing solutions and illustrates the effect of the proposed method in MIPv6 security.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.11591/ijeecs.v12.i1.pp137-146
- https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312
- OA Status
- diamond
- Cited By
- 3
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4232331214
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4232331214Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.11591/ijeecs.v12.i1.pp137-146Digital Object Identifier
- Title
-
Preventing Denial-of-service in Next Generation Internet Protocol MobilityWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-10-01Full publication date if available
- Authors
-
Maanasaa Sethuraman, Senthilkumar MathiList of authors in order
- Landing page
-
https://doi.org/10.11591/ijeecs.v12.i1.pp137-146Publisher landing page
- PDF URL
-
https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312Direct OA link when available
- Concepts
-
IPv4, Computer network, IPv6, Computer science, Computer security, Address space, Internetworking, IPsec, Network address, The Internet, Neighbor Discovery Protocol, Network security, Border Gateway Protocol, Denial-of-service attack, Internet Protocol, Routing protocol, World Wide Web, Routing (electronic design automation), Wireless Routing ProtocolTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2022: 1, 2021: 1, 2020: 1Per-year citation counts (last 5 years)
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4232331214 |
|---|---|
| doi | https://doi.org/10.11591/ijeecs.v12.i1.pp137-146 |
| ids.doi | https://doi.org/10.11591/ijeecs.v12.i1.pp137-146 |
| ids.openalex | https://openalex.org/W4232331214 |
| fwci | 0.24550474 |
| type | article |
| title | Preventing Denial-of-service in Next Generation Internet Protocol Mobility |
| biblio.issue | 1 |
| biblio.volume | 12 |
| biblio.last_page | 137 |
| biblio.first_page | 137 |
| topics[0].id | https://openalex.org/T10651 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9991000294685364 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | IPv6, Mobility, Handover, Networks, Security |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.986299991607666 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T10714 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9854999780654907 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Software-Defined Networks and 5G |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2779233093 |
| concepts[0].level | 4 |
| concepts[0].score | 0.7902474999427795 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q11103 |
| concepts[0].display_name | IPv4 |
| concepts[1].id | https://openalex.org/C31258907 |
| concepts[1].level | 1 |
| concepts[1].score | 0.711245059967041 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[1].display_name | Computer network |
| concepts[2].id | https://openalex.org/C84555802 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7047849893569946 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2551624 |
| concepts[2].display_name | IPv6 |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.678722620010376 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.637859046459198 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C144240696 |
| concepts[5].level | 2 |
| concepts[5].score | 0.625940203666687 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q367204 |
| concepts[5].display_name | Address space |
| concepts[6].id | https://openalex.org/C2780405328 |
| concepts[6].level | 3 |
| concepts[6].score | 0.6249790787696838 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1067099 |
| concepts[6].display_name | Internetworking |
| concepts[7].id | https://openalex.org/C67396069 |
| concepts[7].level | 3 |
| concepts[7].score | 0.5695459246635437 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q210214 |
| concepts[7].display_name | IPsec |
| concepts[8].id | https://openalex.org/C2776599810 |
| concepts[8].level | 2 |
| concepts[8].score | 0.509739100933075 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q4418000 |
| concepts[8].display_name | Network address |
| concepts[9].id | https://openalex.org/C110875604 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4952172338962555 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[9].display_name | The Internet |
| concepts[10].id | https://openalex.org/C165932591 |
| concepts[10].level | 4 |
| concepts[10].score | 0.48013851046562195 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1547947 |
| concepts[10].display_name | Neighbor Discovery Protocol |
| concepts[11].id | https://openalex.org/C182590292 |
| concepts[11].level | 2 |
| concepts[11].score | 0.46818768978118896 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[11].display_name | Network security |
| concepts[12].id | https://openalex.org/C178086212 |
| concepts[12].level | 5 |
| concepts[12].score | 0.46351301670074463 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11155 |
| concepts[12].display_name | Border Gateway Protocol |
| concepts[13].id | https://openalex.org/C38822068 |
| concepts[13].level | 3 |
| concepts[13].score | 0.45132696628570557 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[13].display_name | Denial-of-service attack |
| concepts[14].id | https://openalex.org/C35341882 |
| concepts[14].level | 3 |
| concepts[14].score | 0.31998759508132935 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q8795 |
| concepts[14].display_name | Internet Protocol |
| concepts[15].id | https://openalex.org/C104954878 |
| concepts[15].level | 3 |
| concepts[15].score | 0.2821280360221863 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q1648707 |
| concepts[15].display_name | Routing protocol |
| concepts[16].id | https://openalex.org/C136764020 |
| concepts[16].level | 1 |
| concepts[16].score | 0.1373474895954132 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[16].display_name | World Wide Web |
| concepts[17].id | https://openalex.org/C74172769 |
| concepts[17].level | 2 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q1446839 |
| concepts[17].display_name | Routing (electronic design automation) |
| concepts[18].id | https://openalex.org/C47318570 |
| concepts[18].level | 4 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q8026863 |
| concepts[18].display_name | Wireless Routing Protocol |
| keywords[0].id | https://openalex.org/keywords/ipv4 |
| keywords[0].score | 0.7902474999427795 |
| keywords[0].display_name | IPv4 |
| keywords[1].id | https://openalex.org/keywords/computer-network |
| keywords[1].score | 0.711245059967041 |
| keywords[1].display_name | Computer network |
| keywords[2].id | https://openalex.org/keywords/ipv6 |
| keywords[2].score | 0.7047849893569946 |
| keywords[2].display_name | IPv6 |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.678722620010376 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.637859046459198 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/address-space |
| keywords[5].score | 0.625940203666687 |
| keywords[5].display_name | Address space |
| keywords[6].id | https://openalex.org/keywords/internetworking |
| keywords[6].score | 0.6249790787696838 |
| keywords[6].display_name | Internetworking |
| keywords[7].id | https://openalex.org/keywords/ipsec |
| keywords[7].score | 0.5695459246635437 |
| keywords[7].display_name | IPsec |
| keywords[8].id | https://openalex.org/keywords/network-address |
| keywords[8].score | 0.509739100933075 |
| keywords[8].display_name | Network address |
| keywords[9].id | https://openalex.org/keywords/the-internet |
| keywords[9].score | 0.4952172338962555 |
| keywords[9].display_name | The Internet |
| keywords[10].id | https://openalex.org/keywords/neighbor-discovery-protocol |
| keywords[10].score | 0.48013851046562195 |
| keywords[10].display_name | Neighbor Discovery Protocol |
| keywords[11].id | https://openalex.org/keywords/network-security |
| keywords[11].score | 0.46818768978118896 |
| keywords[11].display_name | Network security |
| keywords[12].id | https://openalex.org/keywords/border-gateway-protocol |
| keywords[12].score | 0.46351301670074463 |
| keywords[12].display_name | Border Gateway Protocol |
| keywords[13].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[13].score | 0.45132696628570557 |
| keywords[13].display_name | Denial-of-service attack |
| keywords[14].id | https://openalex.org/keywords/internet-protocol |
| keywords[14].score | 0.31998759508132935 |
| keywords[14].display_name | Internet Protocol |
| keywords[15].id | https://openalex.org/keywords/routing-protocol |
| keywords[15].score | 0.2821280360221863 |
| keywords[15].display_name | Routing protocol |
| keywords[16].id | https://openalex.org/keywords/world-wide-web |
| keywords[16].score | 0.1373474895954132 |
| keywords[16].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.11591/ijeecs.v12.i1.pp137-146 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764855249 |
| locations[0].source.issn | 2502-4752, 2502-4760 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2502-4752 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Indonesian Journal of Electrical Engineering and Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310315009 |
| locations[0].source.host_organization_name | Institute of Advanced Engineering and Science (IAES) |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310315009 |
| locations[0].source.host_organization_lineage_names | Institute of Advanced Engineering and Science (IAES) |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Indonesian Journal of Electrical Engineering and Computer Science |
| locations[0].landing_page_url | https://doi.org/10.11591/ijeecs.v12.i1.pp137-146 |
| locations[1].id | pmh:oai:zenodo.org:4311021 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400562 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[1].source.host_organization | https://openalex.org/I67311998 |
| locations[1].source.host_organization_name | European Organization for Nuclear Research |
| locations[1].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | info:eu-repo/semantics/article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Indonesian Journal of Electrical Engineering and Computer Science, 12(1), 137-146, (2018-10-01) |
| locations[1].landing_page_url | https://zenodo.org/record/4311021 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5080915435 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Maanasaa Sethuraman |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[0].affiliations[0].raw_affiliation_string | Amrita University |
| authorships[0].institutions[0].id | https://openalex.org/I81556334 |
| authorships[0].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Maanasaa Sethuraman |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Amrita University |
| authorships[1].author.id | https://openalex.org/A5018462739 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7134-8448 |
| authorships[1].author.display_name | Senthilkumar Mathi |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[1].affiliations[0].raw_affiliation_string | Amrita University |
| authorships[1].institutions[0].id | https://openalex.org/I81556334 |
| authorships[1].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Senthilkumar Mathi |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Amrita University |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2022-05-12T00:00:00 |
| display_name | Preventing Denial-of-service in Next Generation Internet Protocol Mobility |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10651 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9991000294685364 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | IPv6, Mobility, Handover, Networks, Security |
| related_works | https://openalex.org/W3135028729, https://openalex.org/W1420530545, https://openalex.org/W2115343659, https://openalex.org/W3190536103, https://openalex.org/W2480874885, https://openalex.org/W2342949430, https://openalex.org/W2790564976, https://openalex.org/W2074136091, https://openalex.org/W314149914, https://openalex.org/W206624854 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2022 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2020 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.11591/ijeecs.v12.i1.pp137-146 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764855249 |
| best_oa_location.source.issn | 2502-4752, 2502-4760 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2502-4752 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Indonesian Journal of Electrical Engineering and Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310315009 |
| best_oa_location.source.host_organization_name | Institute of Advanced Engineering and Science (IAES) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310315009 |
| best_oa_location.source.host_organization_lineage_names | Institute of Advanced Engineering and Science (IAES) |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Indonesian Journal of Electrical Engineering and Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.11591/ijeecs.v12.i1.pp137-146 |
| primary_location.id | doi:10.11591/ijeecs.v12.i1.pp137-146 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764855249 |
| primary_location.source.issn | 2502-4752, 2502-4760 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2502-4752 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Indonesian Journal of Electrical Engineering and Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310315009 |
| primary_location.source.host_organization_name | Institute of Advanced Engineering and Science (IAES) |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310315009 |
| primary_location.source.host_organization_lineage_names | Institute of Advanced Engineering and Science (IAES) |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://ijeecs.iaescore.com/index.php/IJEECS/article/download/12504/9312 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Indonesian Journal of Electrical Engineering and Computer Science |
| primary_location.landing_page_url | https://doi.org/10.11591/ijeecs.v12.i1.pp137-146 |
| publication_date | 2018-10-01 |
| publication_year | 2018 |
| referenced_works | https://openalex.org/W2497847216, https://openalex.org/W2790943775, https://openalex.org/W2612582824, https://openalex.org/W6735971324, https://openalex.org/W2779025677, https://openalex.org/W2034698017, https://openalex.org/W2768306887, https://openalex.org/W2790724796, https://openalex.org/W2750691772, https://openalex.org/W1851526348, https://openalex.org/W2301247615, https://openalex.org/W6699995267, https://openalex.org/W2414471599, https://openalex.org/W2472235817, https://openalex.org/W3117361862, https://openalex.org/W2613014738, https://openalex.org/W2406392259, https://openalex.org/W2400942289, https://openalex.org/W2146100293, https://openalex.org/W2546365239, https://openalex.org/W2371627716, https://openalex.org/W2127305011, https://openalex.org/W2205878693, https://openalex.org/W2582653625, https://openalex.org/W2605479102, https://openalex.org/W2320204756, https://openalex.org/W4293014303 |
| referenced_works_count | 27 |
| abstract_inverted_index.6 | 3 |
| abstract_inverted_index.A | 43 |
| abstract_inverted_index.a | 6, 149, 171, 188 |
| abstract_inverted_index.an | 164 |
| abstract_inverted_index.as | 75 |
| abstract_inverted_index.in | 51, 61, 98, 142, 147, 178, 224 |
| abstract_inverted_index.is | 5, 11, 35, 48, 83, 95, 187, 194 |
| abstract_inverted_index.it | 59, 122 |
| abstract_inverted_index.of | 22, 38, 46, 54, 67, 93, 113, 119, 145, 155, 163, 181, 190, 196, 201, 220 |
| abstract_inverted_index.or | 80 |
| abstract_inverted_index.to | 13, 72, 126, 132, 174 |
| abstract_inverted_index.NDP | 120, 146 |
| abstract_inverted_index.One | 66 |
| abstract_inverted_index.The | 116 |
| abstract_inverted_index.and | 29, 41, 56, 128, 151, 193, 216 |
| abstract_inverted_index.its | 15, 30, 49, 64 |
| abstract_inverted_index.new | 172 |
| abstract_inverted_index.the | 17, 20, 36, 39, 52, 68, 76, 84, 91, 99, 111, 114, 143, 153, 156, 161, 168, 198, 205, 208, 212, 218, 221 |
| abstract_inverted_index.Even | 89 |
| abstract_inverted_index.IPv6 | 34, 47, 100, 182 |
| abstract_inverted_index.This | 184 |
| abstract_inverted_index.With | 19 |
| abstract_inverted_index.even | 123 |
| abstract_inverted_index.gaps | 131 |
| abstract_inverted_index.make | 121 |
| abstract_inverted_index.many | 31, 69 |
| abstract_inverted_index.more | 96, 124 |
| abstract_inverted_index.such | 74, 140 |
| abstract_inverted_index.that | 10, 159 |
| abstract_inverted_index.this | 137 |
| abstract_inverted_index.when | 108 |
| abstract_inverted_index.with | 63 |
| abstract_inverted_index.(DoS) | 177 |
| abstract_inverted_index.Also, | 167, 204 |
| abstract_inverted_index.IPsec | 78 |
| abstract_inverted_index.IPv4. | 18 |
| abstract_inverted_index.IPv6, | 73 |
| abstract_inverted_index.MIPv6 | 225 |
| abstract_inverted_index.These | 106 |
| abstract_inverted_index.among | 211 |
| abstract_inverted_index.ample | 23 |
| abstract_inverted_index.exist | 104 |
| abstract_inverted_index.paper | 138, 169, 206 |
| abstract_inverted_index.still | 103 |
| abstract_inverted_index.there | 102 |
| abstract_inverted_index.these | 130, 202 |
| abstract_inverted_index.where | 58 |
| abstract_inverted_index.(IPv6) | 4 |
| abstract_inverted_index.(NDP). | 88 |
| abstract_inverted_index.Hence, | 136 |
| abstract_inverted_index.domain | 53 |
| abstract_inverted_index.effect | 219 |
| abstract_inverted_index.ensure | 133 |
| abstract_inverted_index.future | 37 |
| abstract_inverted_index.header | 27 |
| abstract_inverted_index.hybrid | 189 |
| abstract_inverted_index.method | 173, 223 |
| abstract_inverted_index.safety | 162 |
| abstract_inverted_index.scores | 60 |
| abstract_inverted_index.space, | 25 |
| abstract_inverted_index.target | 110 |
| abstract_inverted_index.though | 90 |
| abstract_inverted_index.address | 24, 81, 129 |
| abstract_inverted_index.attacks | 158 |
| abstract_inverted_index.benefit | 21 |
| abstract_inverted_index.capable | 195 |
| abstract_inverted_index.concept | 92 |
| abstract_inverted_index.devised | 12 |
| abstract_inverted_index.network | 134, 150, 179 |
| abstract_inverted_index.process | 154 |
| abstract_inverted_index.replace | 14 |
| abstract_inverted_index.various | 213 |
| abstract_inverted_index.version | 2 |
| abstract_inverted_index.Internet | 0, 40 |
| abstract_inverted_index.Neighbor | 85 |
| abstract_inverted_index.Protocol | 1, 87 |
| abstract_inverted_index.analysis | 210 |
| abstract_inverted_index.analyzes | 152 |
| abstract_inverted_index.approach | 186 |
| abstract_inverted_index.creating | 148 |
| abstract_inverted_index.endanger | 160 |
| abstract_inverted_index.existing | 191, 214 |
| abstract_inverted_index.features | 70 |
| abstract_inverted_index.flexible | 26 |
| abstract_inverted_index.identify | 127 |
| abstract_inverted_index.internet | 8 |
| abstract_inverted_index.methods. | 203 |
| abstract_inverted_index.mitigate | 175 |
| abstract_inverted_index.mobility | 180 |
| abstract_inverted_index.network. | 166 |
| abstract_inverted_index.proposed | 185, 222 |
| abstract_inverted_index.proposes | 170 |
| abstract_inverted_index.protocol | 9 |
| abstract_inverted_index.security | 55, 94 |
| abstract_inverted_index.specific | 32, 71 |
| abstract_inverted_index.Discovery | 86 |
| abstract_inverted_index.advantage | 45 |
| abstract_inverted_index.discusses | 207 |
| abstract_inverted_index.exploited | 109 |
| abstract_inverted_index.extensive | 117 |
| abstract_inverted_index.features, | 33 |
| abstract_inverted_index.loopholes | 107, 141 |
| abstract_inverted_index.mandatory | 77 |
| abstract_inverted_index.messaging | 79 |
| abstract_inverted_index.mobility, | 57 |
| abstract_inverted_index.necessary | 125 |
| abstract_inverted_index.networks. | 183 |
| abstract_inverted_index.security. | 135, 226 |
| abstract_inverted_index.solutions | 192, 215 |
| abstract_inverted_index.comparison | 62 |
| abstract_inverted_index.extensions | 28 |
| abstract_inverted_index.foundation | 112 |
| abstract_inverted_index.loopholes. | 105 |
| abstract_inverted_index.overcoming | 197 |
| abstract_inverted_index.pronounced | 97 |
| abstract_inverted_index.protocols, | 101 |
| abstract_inverted_index.comparative | 209 |
| abstract_inverted_index.established | 165 |
| abstract_inverted_index.illustrates | 217 |
| abstract_inverted_index.significant | 44, 199 |
| abstract_inverted_index.applications | 118, 144 |
| abstract_inverted_index.capabilities | 50 |
| abstract_inverted_index.investigates | 139 |
| abstract_inverted_index.predecessor, | 16 |
| abstract_inverted_index.predecessor. | 65 |
| abstract_inverted_index.disadvantages | 200 |
| abstract_inverted_index.next-generation | 7 |
| abstract_inverted_index.Internetworking. | 42, 115 |
| abstract_inverted_index.Denial-of-Service | 176 |
| abstract_inverted_index.denial-of-service | 157 |
| abstract_inverted_index.auto-configuration, | 82 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.61132594 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |