Skip to main content

Security Threats to Network-based Localized Mobillity Management

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors James Kempf , Christian Vogt
Last updated 2008-03-03 (Latest revision 2006-02-15)
Replaced by RFC 4832
RFC stream (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-netlmm-threats
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This document discusses security threats to NETLMM-based mobility management with a focus on threats on the interface between mobile nodes and access routers. Threats to the NETLMM protocol itself, which runs between the access routers and mobility anchor points, are similar to those faced by other protocols between network entities like routers. These threats are handled in the NETLMM protocol specification. In contrast, threats on the interface between mobile nodes and access routers are different, because the access routers are presenting the NETLMM domain as a single subnet, in order to allow mobile nodes to continue using the same IP address as they move from one access router to another.


James Kempf
Christian Vogt

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)