@techreport{haddad-mext-mip6-residual-threats-02, number = {draft-haddad-mext-mip6-residual-threats-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-haddad-mext-mip6-residual-threats/02/}, author = {Wassim Haddad and George Tsirtsis and Benjamin Lim and Suresh Krishnan and Francis Dupont}, title = {{Mobile IPv6 Residual Threats}}, pagetotal = 15, year = 2008, month = jul, day = 14, abstract = {This memo aims to highlight specific "residual" threats in Mobile IPv6 protocol. We call these threats "residual" simply because they were rightfully deemed not urgent during the design of Mobile IPv6 protocol. However, these threats are somehow benefiting from new mechanisms and/or extensions built on top of Mobile IPv6 protocol to improve their effects and likelihood. Hence, our main goal is to motivate designers to re-assess their potential taking into consideration these new mechanisms.}, }