First, one specific comment:
An added limitation imposed by this approach is that all the
potential source and destination locators have to be known beforehand
by the receiver in order to be recognized.
==> I don't understand why this is a limitation in practice (though it may
be an architectural limitation). Isn't the assumption that all the
potential locators must be exchanged somehow before the network
connectivity failure, otherwise the shim6 solution might not be able to
switch to working locators? Otherwise the rehoming could not be secured...