K. S. and S. K. , Security Architecture for the Internet Protocol, RFC, vol.4301, 2005.

C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, and T. Kivinen, Internet key exchange protocol version 2 (IKEv2), 2014.

A. Project, Deliverable d6.2: Specification of the problems in the high-level specification language, 2003.

C. Cremers, Key exchange in ipsec revisited: Formal analysis of ikev1 and ikev2, European Symposium on Research in Computer Security, 2011.

C. Meadows, Analysis of the internet key exchange protocol using the nrl protocol analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.

E. Cambiaso, G. Papaleo, and M. Aiello, Slowdroid: Turning a smartphone into a mobile attack vector, 2014 International Conference on Future Internet of Things and Cloud, 2014.

W. Contributors, Arp spoofing, vol.23, 2018.

D. Song,

Y. Nir and V. Smyslov, Protecting internet key exchange protocol version 2 (ikev2) implementations from distributed denial-of-service attacks, RFC, vol.8019, 2016.

G. Huang, S. Beaulieu, and D. Rochefort, A traffic-based method of detecting dead internet key exchange (ike) peers, vol.3706, 2004.

R. Perlman, Understanding ikev2: Tutorial, and rationale for decisions, RFC Editor, 2003.