Y. Tian, Y. Zhang, and H. Zhang, Identity-based Hierarchical Access Authentication in Mobile IPv6 Networks, 2006 IEEE International Conference on Communications, pp.1953-1958, 2006.
DOI : 10.1109/ICC.2006.255056

K. Elgoarany and M. Eltoweissy, Security in Mobile IPv6: A survey, Information Security Technical Report, vol.12, issue.1, pp.32-43, 2007.
DOI : 10.1016/j.istr.2007.02.002

T. Aura and M. Roe, Conception du Protocole de S??curit?? Pour Mobile IPV6, annals of telecommunications - annales des t??l??communications, vol.29, issue.3???4, pp.61-64, 2006.
DOI : 10.1007/BF03219911

H. Choi, H. Song, and G. Cao, Mobile multi-layered IPsec, Wireless Networks, pp.1929-1939, 2005.
DOI : 10.1007/s11276-007-0031-z

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7815

Y. Yebin, W. Qingxian, L. Junyong, and H. Luzi, Optimized Method of Constructing IPSec SA between MN and HA in MobileIPv6, Journal of Information Engineering University, issue.2, pp.222-224, 2008.

A. Conta and S. Deering, Generic Packet Tunneling in IPv6 Specification, RFC 2473[J]. OverDRiVE 102 Description and Validation of Mobile Router and Dynamic IVAN Management, 1998.

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Siam Journal on Computing, vol.32, issue.3, pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708

P. S. Barreto, H. Y. Kim, and B. Lynn, Efficient algorithms for pairing-based cryptosystems Advances in cryptologyCRYPTO, pp.354-369, 2002.

K. Sun and Y. Kim, Flow Mobility Management in PMIPv6-based D- MM (Distributed Mobility Management) Networks, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.120-127, 2014.

K. Andersson and M. Elkotob, Rethinking IP Mobility Management, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.41-49, 2012.

A. J. Jara, L. Ladid, and A. Skarmeta, The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.97-118, 2013.