IP Mobility Protocols - Threat Analysis
draft-vidya-ip-mobility-threats-01
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Vidya Narayanan | ||
Last updated | 2007-07-11 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Despite the variety of ways to realize mobility support in IP, there is a common set of threats that each IP mobility protocol must address. Awareness of these threats is paramount for protocol engineers so that they can build appropriate security mechanisms into their protocols. This document defines a threat model that can serve as a guidance for protocol engineers.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)