eMobile internet protocol version six (IPv6) testbed for interoperability of Nigerian education services and networks
(1) Department of Computer Science, University of Ibadan, Ibadan, Nigeria
Corresponding Author
Abstract
Keywords
References
Dutta N, Saha IS Misra, Pokhrel R, & Mrinal K (2014). Performance Analysis of Multilayer MIPv6 Architecture through Experimental Test bed, Journal of Network, Vol 7, pp 1682-1691
Cho S , Na J , K im C , Lee S , Kang H , Koo C ( ‖Neighbor MR Authentication and Registration Mechanism in Multihomed Mobile Networks Networks‖ IETF Internet Draft.
Atiquzzaman M, Shahriar AZM, & Ivancic W (2010). Route optimization in network mobility: Solutions, classification, comparison, and future research directions," IEEE Communications Surveys & Tutorials, Vol.12, No.1, pp.24-38.
Adeniji OD & Olatunji OO 2020. Zero Day Attack Prediction with Parameter Setting Using Bi Direction Recurrent Neural Network in Cyber Security. International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 3, pp 111-118.
Chandavarkar BR. Deployment of a Simple and CostDeployment of a Simple and Cost--Effective Mobile IPv6 Testbed Effective Mobile IPv6 Testbed for the Stfor the Study of Handover Executionudy of Handover Execution (2020).(2020). ICCCE 2020, Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering.
Adeniji ODAdeniji OD & & Osofisan Osofisan AA (2020). (2020). Route Optimization in MIPv6 Experimental Test Route Optimization in MIPv6 Experimental Test bed for Network bed for Network Mobility: Tradeoff Analysis and Evaluation. International Journal Mobility: Tradeoff Analysis and Evaluation. International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 5,of Computer Science and Information Security (IJCSIS), Vol. 18, No. 5, pp 19pp 19--28.28.
Logunleko KB, Adeniji OD, & Logunleko AM (2020). A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security. International Journal of Scientific Research in Computer Science and Engineering Vol.8, Issue.1, pp.45-51.
Lakshmanan S, Tsao CL, Sivakumar R, & Sundaresan K (2008). Securing wireless data networks against eavesdropping using smart antennas,” in Proceedings of the. International Conference on Distributed Computing Systems ICDCS'08, pp. 19–27, Bandung, Indonesia, 2008.
Raymond DR & Midkiff SF (2008). “Denial-of-service in wireless sensor networks: attacks and defenses,” IEEE Pervasive Computing, vol. 7, no. 1
Kannhavong B (2007). “A survey of routing attacks in mobile ad hoc networks”, IEEE Wireless Communications, vol. 14, no. 5.
Meyer U & Wetzel S (2004). “A man-in-the-middle attack on UMTS,” in Proceedings of the 3rd ACM Workshop on Wireless Security, ACM, New York, NY, USA.
Ohigashi T & Morii M (2009). “A practical message falsification attack on WPA,” JWIS, vol. 14, 2009.
Norton S (2016). “Norton cyber security insights report.
Olabisi AA, Adeniji OD, & Abeng E (2019). A Comparative Analysis of Latency, Jitter and Bandwidth of IPv6 Packets Using Flow Labels in Open Flow Switch in Software Defined Network‖ Afr. J. MIS, Vol.1, Issue 3, pp. 30-36.
Article Metrics
Abstract View : 176 timesPDF Download : 53 times
DOI: 10.57046/MQMR6717
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Proceedings of the Nigerian Academy of Science
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.