%% You should probably cite draft-ietf-netlmm-threats instead of this I-D. @techreport{kempf-netlmm-threats-00, number = {draft-kempf-netlmm-threats-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-kempf-netlmm-threats/00/}, author = {James Kempf and Christian Vogt}, title = {{Security Threats to Network-based Localized Mobillity Management}}, pagetotal = 14, year = 2006, month = feb, day = 15, abstract = {This document discusses security threats to NETLMM-based mobility management with a focus on threats on the interface between mobile nodes and access routers. Threats to the NETLMM protocol itself, which runs between the access routers and mobility anchor points, are similar to those faced by other protocols between network entities like routers. These threats are handled in the NETLMM protocol specification. In contrast, threats on the interface between mobile nodes and access routers are different, because the access routers are presenting the NETLMM domain as a single subnet, in order to allow mobile nodes to continue using the same IP address as they move from one access router to another.}, }