D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon et al., Accountable internet protocol(aip), Proceedings of ACM SIGCOMM, 2008.
DOI : 10.1145/1402958.1402997

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.5880

J. Arkko, V. Devarapalli, and F. Dupont, Using ipsec to protect mobile ipv6 signaling between mobile nodes and home agents, 2004.
DOI : 10.17487/rfc3776

T. Aura, Cryptographically generated addresses(cga), RFC, vol.3972, 2005.
DOI : 10.17487/rfc3972

J. Bos, O. Zen, and J. Hubaux, A nalysis and optimization of cryptographically generated addresses(cga), Proceedings of ISC, 2009.

K. Elgoarany and M. Eltoweissy, Security in Mobile IPv6: A survey, Information Security Technical Report, vol.12, issue.1, pp.32-43, 2007.
DOI : 10.1016/j.istr.2007.02.002

Y. Hu, D. Chiu, and J. C. Lui, Entropy based adaptive flow aggregation, IEEE/ACM Transactions on Networking(TON), vol.17, issue.3, pp.115-139, 2009.

D. B. Johnson, C. Perkins, and J. Arkko, Mobility support in ipv6, RFC, vol.3775, 2004.
DOI : 10.17487/rfc3775

A. Kivi, Mobile data adoption in finland, Proceedings of the 6th Conference on Telecommunication Techno-Economics(CTTE), 2005.
DOI : 10.1109/ctte.2007.4389881

J. Li, P. Zhang, and S. Sampalli, Improved security mechanism for mobile ipv6, International Journal of Network Security, vol.6, issue.3, pp.291-300, 2008.

A. Mankin, . Patil, . Harkins, . Nordmark, . Nikander et al., Threat models introduced by mobile ipv6 and requirements for security in mobile ipv6. IETF draft-ietf-mipv6-scrty-reqts-02, 2001.

R. Moskowitz and P. Nikander, Host identity protocol (hip) architecture, RFC, vol.4423, 2006.
DOI : 10.17487/rfc4423

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.240

P. Nikander, T. Aura, J. Arkko, and G. Montenegro, Mobile IP version 6 (MIPv6) route optimization security design, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003.
DOI : 10.1109/VETECF.2003.1285376

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.9015

K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou et al., Routing optimization security in mobile IPv6, Computer Networks, vol.50, issue.13, pp.502401-2419, 2006.
DOI : 10.1016/j.comnet.2005.09.019

A. Riikonen, Mobile internet usage -network traffic measurements. Master's Thesis, 2009.

S. Song, H. Choi, and J. Kim, A secure and light weight approach for routing optimization in mobile ipv6, EURASIP Journal on Wireless Communications and Networking, 2009.

J. Wu, J. Bi, X. Li, G. Ren, K. Xu et al., A source address validation architecture (sava) testbed and deployment experience, RFC, vol.5210, 2008.
DOI : 10.17487/rfc5210

J. Wu, G. Ren, and X. Li, Source Address Validation: Architecture and Protocol Design, 2007 IEEE International Conference on Network Protocols, 2007.
DOI : 10.1109/ICNP.2007.4375858

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.8564