International Journal of Computer Applications
After the evolution from 2G to 3G and now 3G to 4G, 4G will be based on the transmission of IP packets only, using an architecture known as mobile IPv6. This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. The authors first explain all the possible threats evolved due to route optimization technique and then possible defense mechanism to counter them. They have analyzed all that defense mechanism through comparative discussion and tried to find out best solution which may be more efficient and less complex.