IPv6 and IPv4 Security challenge Analysis and Best- Practice Scenario
Journal: International Journal of Advanced Networking and Applications (Vol.1, No. 04)Publication Date: 2010-01-04
Authors : Viney Sharma;
Page : 258-269
Keywords : IPv4; IPv6; IPsec; Security; Transition mechanism;
Abstract
Sharing of information and resources among different devices require networking. As networks are expanding day by day, Internet Protocols are gaining more and more popularity. Different transition mechanisms have been established and yet a lot of research is to be carried out. Internet Protocol version 6 (IPv6) is the next generation Internet Protocol proposed by the Internet Engineering Task Force (IETF) to supersede the current Internet Protocol version 4 (IPv4). To enable the integration of IPv6 into current networks, several transition mechanisms have been proposed by the IETF IPng Transition Working Group. This work examines and empirically evaluates two transition mechanisms, namely 6-over-4, and IPv6 in IPv4 tunneling, as they relate to the performance of IPv6.This paper outlines many of the common known threats against IPv4 and then compares and contrasts how these threats, or similar ones, might affect an IPv6 network. Some new threats specific to IPv6 are also considered. The current capabilities of available products are evaluated, as is how any inherent protocol characteristics of IPv6 affect the nature of the threat. This is prefaced by a brief overview of current best practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.
Other Latest Articles
- Packet Transmission Analysis in Vehicular Ad Hoc Networks using Revival Mobility Model
- Cluster head Election for CGSR Routing Protocol Using Fuzzy Logic Controller for Mobile Ad Hoc Network
- Ontology Generation from Session Data for Web Personalization
- A Rake Receiver Model for Filtering White Nose Presence in the Receiving Signals
- A New Optimal Approach for evaluating the size of BDD for calculating the Reliability of a CCN
Last modified: 2015-12-05 20:50:09