The Community for Technology Leaders
RSS Icon
Issue No.02 - February (2009 vol.42)
pp: 36-42
Carlos E. Caicedo , University of Pittsburgh
James B.D. Joshi , University of Pittsburgh
IPv6, the new version of the Internet Protocol, has been developed to provide new services and to support the Internet's growth. An overview of the key security issues outlines the challenges in deploying and transitioning to IPv6.
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
Carlos E. Caicedo, James B.D. Joshi, Summit R. Tuladhar, "IPv6 Security Challenges", Computer, vol.42, no. 2, pp. 36-42, February 2009, doi:10.1109/MC.2009.54
1. IPv6 Task Force, "Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)," Jan. 2006, US Dept. of Commerce; finalipv6finalTOC.htm.
2. G. Van de Velde et al., Local Network Protection for IPv6, IETF RFC 4684, May 2007; www.rfc-archive.orggetrfc.php?rfc=4864&tag=Local-Network-Protection-for-IPv6 .
3. S. Convery and D. Miller, "IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0)," Mar. 2004; www.seanconvery.comv6-v4-threats.pdf.
4. P. Nikander, J. Kempf, and E. Nordmark, IPv6 Neighbor Discovery (ND) Trust Models and Threats, IETF RFC 3756, May 2004; www.rfc-archive.orggetrfc.php?rfc=3756.
5. T. Doan, "IPv6 Security Assessment,"1 June 2006, SAIC; .
6. J. Arrko et al., SEcure Neighbor Discovery (SEND), IETF RFC 3971, Mar. 2005; www.rfc-archive.orggetrfc.php?rfc=3971.
7. A.F. Gómez-Skarmeta et al., "PKI Services for IPv6," IEEE Internet Computing, May/June 2003, pp. 36-42.
8. E. Davies, S. Krishnan, and P. Savola, IPv6 Transition/Coexistence Security Considerations, IETF RFC 4942, Sept. 2007; www.rfc-archive.orggetrfc.php?rfc=4942&tag=IPv6-Transition%2FCoexistence-Security-Considerations .
9. M. Dunmore ed., An IPv6 Deployment Guide, 6NET Consortium, Sept. 2005;
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool