IPv6 Security Challenges

IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer (Long Beach, Calif.) Calif.), 2009-02, Vol.42 (2), p.36-42
Hauptverfasser: Caicedo, C.E., Joshi, J.B.D., Tuladhar, S.R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 42
container_issue 2
container_start_page 36
container_title Computer (Long Beach, Calif.)
container_volume 42
creator Caicedo, C.E.
Joshi, J.B.D.
Tuladhar, S.R.
description IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.
doi_str_mv 10.1109/MC.2009.54
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_197428047</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4781968</ieee_id><sourcerecordid>1644906571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c340t-a81589e60feee874ec72693848a9e6ffd38d07b9f2fa282ef5f16ccabf66a5c13</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoWKsXT4KXIoggbM1k8zE5lsWPQouCeg5pmuiW7W5NukL_vVtaevA0zMwz78y8hFwCHQJQ_TAthoxSPRT8iPRACMwoAj8mPUoBMw2SnZKzlBZdylHkPXI1fvuVg3fv2liuN4Pi21aVr798OicnwVbJX-xjn3w-PX4UL9nk9XlcjCaZyzldZxZBoPaSBu89Ku6dYlLnyNF21RDmOc6pmunAgmXIfBABpHN2FqS0wkHeJ3c73VVsflqf1mZZJueryta-aZNBqVEqpXRH3vwjF00b6-44A1pxhpSrDrrfQS42KUUfzCqWSxs3BqjZWmSmhdlaZATv4Nu9ok3OViHa2pXpMMEg5xL4dvP1jiu7Jw9trhC0xPwPaJ9r6A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>197428047</pqid></control><display><type>article</type><title>IPv6 Security Challenges</title><source>IEEE Electronic Library (IEL)</source><creator>Caicedo, C.E. ; Joshi, J.B.D. ; Tuladhar, S.R.</creator><creatorcontrib>Caicedo, C.E. ; Joshi, J.B.D. ; Tuladhar, S.R.</creatorcontrib><description>IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.</description><identifier>ISSN: 0018-9162</identifier><identifier>EISSN: 1558-0814</identifier><identifier>DOI: 10.1109/MC.2009.54</identifier><identifier>CODEN: CPTRB4</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Authentication ; Communication system security ; Computer information security ; Computer science; control theory; systems ; Computer security ; Computer systems and distributed systems. User interface ; Data security ; Exact sciences and technology ; Hackers ; Information security ; Internet Protocol ; IP (Internet Protocol) ; IP networks ; IPSec ; IPv4 ; IPv6 ; Network address translation ; network attacks ; Network security ; Product development ; Protocols ; Software ; Space technology ; Switches</subject><ispartof>Computer (Long Beach, Calif.), 2009-02, Vol.42 (2), p.36-42</ispartof><rights>2009 INIST-CNRS</rights><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Feb 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c340t-a81589e60feee874ec72693848a9e6ffd38d07b9f2fa282ef5f16ccabf66a5c13</citedby><cites>FETCH-LOGICAL-c340t-a81589e60feee874ec72693848a9e6ffd38d07b9f2fa282ef5f16ccabf66a5c13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4781968$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4781968$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=21346149$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Caicedo, C.E.</creatorcontrib><creatorcontrib>Joshi, J.B.D.</creatorcontrib><creatorcontrib>Tuladhar, S.R.</creatorcontrib><title>IPv6 Security Challenges</title><title>Computer (Long Beach, Calif.)</title><addtitle>MC</addtitle><description>IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Communication system security</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Data security</subject><subject>Exact sciences and technology</subject><subject>Hackers</subject><subject>Information security</subject><subject>Internet Protocol</subject><subject>IP (Internet Protocol)</subject><subject>IP networks</subject><subject>IPSec</subject><subject>IPv4</subject><subject>IPv6</subject><subject>Network address translation</subject><subject>network attacks</subject><subject>Network security</subject><subject>Product development</subject><subject>Protocols</subject><subject>Software</subject><subject>Space technology</subject><subject>Switches</subject><issn>0018-9162</issn><issn>1558-0814</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoWKsXT4KXIoggbM1k8zE5lsWPQouCeg5pmuiW7W5NukL_vVtaevA0zMwz78y8hFwCHQJQ_TAthoxSPRT8iPRACMwoAj8mPUoBMw2SnZKzlBZdylHkPXI1fvuVg3fv2liuN4Pi21aVr798OicnwVbJX-xjn3w-PX4UL9nk9XlcjCaZyzldZxZBoPaSBu89Ku6dYlLnyNF21RDmOc6pmunAgmXIfBABpHN2FqS0wkHeJ3c73VVsflqf1mZZJueryta-aZNBqVEqpXRH3vwjF00b6-44A1pxhpSrDrrfQS42KUUfzCqWSxs3BqjZWmSmhdlaZATv4Nu9ok3OViHa2pXpMMEg5xL4dvP1jiu7Jw9trhC0xPwPaJ9r6A</recordid><startdate>20090201</startdate><enddate>20090201</enddate><creator>Caicedo, C.E.</creator><creator>Joshi, J.B.D.</creator><creator>Tuladhar, S.R.</creator><general>IEEE</general><general>IEEE Computer Society</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20090201</creationdate><title>IPv6 Security Challenges</title><author>Caicedo, C.E. ; Joshi, J.B.D. ; Tuladhar, S.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c340t-a81589e60feee874ec72693848a9e6ffd38d07b9f2fa282ef5f16ccabf66a5c13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Communication system security</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Data security</topic><topic>Exact sciences and technology</topic><topic>Hackers</topic><topic>Information security</topic><topic>Internet Protocol</topic><topic>IP (Internet Protocol)</topic><topic>IP networks</topic><topic>IPSec</topic><topic>IPv4</topic><topic>IPv6</topic><topic>Network address translation</topic><topic>network attacks</topic><topic>Network security</topic><topic>Product development</topic><topic>Protocols</topic><topic>Software</topic><topic>Space technology</topic><topic>Switches</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Caicedo, C.E.</creatorcontrib><creatorcontrib>Joshi, J.B.D.</creatorcontrib><creatorcontrib>Tuladhar, S.R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>Computer (Long Beach, Calif.)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Caicedo, C.E.</au><au>Joshi, J.B.D.</au><au>Tuladhar, S.R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>IPv6 Security Challenges</atitle><jtitle>Computer (Long Beach, Calif.)</jtitle><stitle>MC</stitle><date>2009-02-01</date><risdate>2009</risdate><volume>42</volume><issue>2</issue><spage>36</spage><epage>42</epage><pages>36-42</pages><issn>0018-9162</issn><eissn>1558-0814</eissn><coden>CPTRB4</coden><abstract>IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/MC.2009.54</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9162
ispartof Computer (Long Beach, Calif.), 2009-02, Vol.42 (2), p.36-42
issn 0018-9162
1558-0814
language eng
recordid cdi_proquest_journals_197428047
source IEEE Electronic Library (IEL)
subjects Applied sciences
Authentication
Communication system security
Computer information security
Computer science
control theory
systems
Computer security
Computer systems and distributed systems. User interface
Data security
Exact sciences and technology
Hackers
Information security
Internet Protocol
IP (Internet Protocol)
IP networks
IPSec
IPv4
IPv6
Network address translation
network attacks
Network security
Product development
Protocols
Software
Space technology
Switches
title IPv6 Security Challenges
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T13%3A56%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=IPv6%20Security%20Challenges&rft.jtitle=Computer%20(Long%20Beach,%20Calif.)&rft.au=Caicedo,%20C.E.&rft.date=2009-02-01&rft.volume=42&rft.issue=2&rft.spage=36&rft.epage=42&rft.pages=36-42&rft.issn=0018-9162&rft.eissn=1558-0814&rft.coden=CPTRB4&rft_id=info:doi/10.1109/MC.2009.54&rft_dat=%3Cproquest_RIE%3E1644906571%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=197428047&rft_id=info:pmid/&rft_ieee_id=4781968&rfr_iscdi=true