This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
IPv6 Security Challenges
February 2009 (vol. 42 no. 2)
pp. 36-42
Carlos E. Caicedo, University of Pittsburgh
James B.D. Joshi, University of Pittsburgh
IPv6, the new version of the Internet Protocol, has been developed to provide new services and to support the Internet's growth. An overview of the key security issues outlines the challenges in deploying and transitioning to IPv6.

1. IPv6 Task Force, "Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)," Jan. 2006, US Dept. of Commerce; www.ntia.doc.gov/ntiahome/ntiageneral/ipv6/ finalipv6finalTOC.htm.
2. G. Van de Velde et al., Local Network Protection for IPv6, IETF RFC 4684, May 2007; www.rfc-archive.orggetrfc.php?rfc=4864&tag=Local-Network-Protection-for-IPv6 .
3. S. Convery and D. Miller, "IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0)," Mar. 2004; www.seanconvery.comv6-v4-threats.pdf.
4. P. Nikander, J. Kempf, and E. Nordmark, IPv6 Neighbor Discovery (ND) Trust Models and Threats, IETF RFC 3756, May 2004; www.rfc-archive.orggetrfc.php?rfc=3756.
5. T. Doan, "IPv6 Security Assessment,"1 June 2006, SAIC; www.hpcmo.hpc.mil/Htdocs/DREN2006SEP01_IPv6SecurityAssessment.pdf .
6. J. Arrko et al., SEcure Neighbor Discovery (SEND), IETF RFC 3971, Mar. 2005; www.rfc-archive.orggetrfc.php?rfc=3971.
7. A.F. Gómez-Skarmeta et al., "PKI Services for IPv6," IEEE Internet Computing, May/June 2003, pp. 36-42.
8. E. Davies, S. Krishnan, and P. Savola, IPv6 Transition/Coexistence Security Considerations, IETF RFC 4942, Sept. 2007; www.rfc-archive.orggetrfc.php?rfc=4942&tag=IPv6-Transition%2FCoexistence-Security-Considerations .
9. M. Dunmore ed., An IPv6 Deployment Guide, 6NET Consortium, Sept. 2005; www.6net.org/bookdeployment-guide.pdf.

Index Terms:
IPv6, IPv4, network security, network attacks, IPSec, Internet Protocol
Citation:
Carlos E. Caicedo, James B.D. Joshi, Summit R. Tuladhar, "IPv6 Security Challenges," Computer, vol. 42, no. 2, pp. 36-42, Feb. 2009, doi:10.1109/MC.2009.54
Usage of this product signifies your acceptance of the Terms of Use.