Security threats for IPv6 transition strategies

A review

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

There is a growing perception among communications experts that IPv6 and its associated protocols is set to soon replace the current IP version. This is somewhat interesting given that general adoption of IPv6 has been slow. Perhaps this can be explained by the short-term fixes to IPv4 address including classless addressing and NAT. Because of these short-term solutions in addition that IPv4 is not capable to manage the growth of information systems, particularly the growth of internet technologies and services including cloud computing, mobile IP, IP telephony, and IP-capable mobile telephony, all of which necessitate the use of IPv6. There is however a realization that the transformation must be gradual and properly guided and managed. To this end, the Internet Engineering Task Force (IETF) was formed to assist in the transition from IPv4 to IPv6 Dual Stack, Header Translation and Tunneling. The mechanisms employed in this transition consist of changes to protocol mechanisms affecting hosts and routers, addressing and deployment, that are designed to avoid mishap and facilitate a smooth transition from IPv4 to IPv6. Given the inevitability of adopting IPv6, this paper focuses on a detailed examination of the transition techniques and its associated benefits and possible shortcomings. Furthermore, the security threats for each transition technique are overviewed.

Original languageEnglish
Title of host publication2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages83-88
Number of pages6
Volume2014-August
ISBN (Electronic)9781479946211
DOIs
Publication statusPublished - 9 Jan 2015
Event2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014 - Kuala Lumpur, Malaysia
Duration: 27 Aug 201429 Aug 2014

Other

Other2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014
CountryMalaysia
CityKuala Lumpur
Period27/8/1429/8/14

Fingerprint

Mobile cloud computing
Internet
Network protocols
Routers
Information systems
Communication
Threat

Keywords

  • Dual Stack
  • IPv4
  • IPv6
  • Translation
  • Tunneling

ASJC Scopus subject areas

  • Engineering(all)
  • Management of Technology and Innovation
  • Computer Science Applications

Cite this

Ahmed, A. S., Hassan, R., & Othman, N. E. (2015). Security threats for IPv6 transition strategies: A review. In 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014 (Vol. 2014-August, pp. 83-88). [7006224] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICE2T.2014.7006224

Security threats for IPv6 transition strategies : A review. / Ahmed, Amjed Sid; Hassan, Rosilah; Othman, Nor Effendy.

2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014. Vol. 2014-August Institute of Electrical and Electronics Engineers Inc., 2015. p. 83-88 7006224.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ahmed, AS, Hassan, R & Othman, NE 2015, Security threats for IPv6 transition strategies: A review. in 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014. vol. 2014-August, 7006224, Institute of Electrical and Electronics Engineers Inc., pp. 83-88, 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014, Kuala Lumpur, Malaysia, 27/8/14. https://doi.org/10.1109/ICE2T.2014.7006224
Ahmed AS, Hassan R, Othman NE. Security threats for IPv6 transition strategies: A review. In 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014. Vol. 2014-August. Institute of Electrical and Electronics Engineers Inc. 2015. p. 83-88. 7006224 https://doi.org/10.1109/ICE2T.2014.7006224
Ahmed, Amjed Sid ; Hassan, Rosilah ; Othman, Nor Effendy. / Security threats for IPv6 transition strategies : A review. 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014. Vol. 2014-August Institute of Electrical and Electronics Engineers Inc., 2015. pp. 83-88
@inproceedings{0781c1f6b758468995154bb7db2954ff,
title = "Security threats for IPv6 transition strategies: A review",
abstract = "There is a growing perception among communications experts that IPv6 and its associated protocols is set to soon replace the current IP version. This is somewhat interesting given that general adoption of IPv6 has been slow. Perhaps this can be explained by the short-term fixes to IPv4 address including classless addressing and NAT. Because of these short-term solutions in addition that IPv4 is not capable to manage the growth of information systems, particularly the growth of internet technologies and services including cloud computing, mobile IP, IP telephony, and IP-capable mobile telephony, all of which necessitate the use of IPv6. There is however a realization that the transformation must be gradual and properly guided and managed. To this end, the Internet Engineering Task Force (IETF) was formed to assist in the transition from IPv4 to IPv6 Dual Stack, Header Translation and Tunneling. The mechanisms employed in this transition consist of changes to protocol mechanisms affecting hosts and routers, addressing and deployment, that are designed to avoid mishap and facilitate a smooth transition from IPv4 to IPv6. Given the inevitability of adopting IPv6, this paper focuses on a detailed examination of the transition techniques and its associated benefits and possible shortcomings. Furthermore, the security threats for each transition technique are overviewed.",
keywords = "Dual Stack, IPv4, IPv6, Translation, Tunneling",
author = "Ahmed, {Amjed Sid} and Rosilah Hassan and Othman, {Nor Effendy}",
year = "2015",
month = "1",
day = "9",
doi = "10.1109/ICE2T.2014.7006224",
language = "English",
volume = "2014-August",
pages = "83--88",
booktitle = "2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Security threats for IPv6 transition strategies

T2 - A review

AU - Ahmed, Amjed Sid

AU - Hassan, Rosilah

AU - Othman, Nor Effendy

PY - 2015/1/9

Y1 - 2015/1/9

N2 - There is a growing perception among communications experts that IPv6 and its associated protocols is set to soon replace the current IP version. This is somewhat interesting given that general adoption of IPv6 has been slow. Perhaps this can be explained by the short-term fixes to IPv4 address including classless addressing and NAT. Because of these short-term solutions in addition that IPv4 is not capable to manage the growth of information systems, particularly the growth of internet technologies and services including cloud computing, mobile IP, IP telephony, and IP-capable mobile telephony, all of which necessitate the use of IPv6. There is however a realization that the transformation must be gradual and properly guided and managed. To this end, the Internet Engineering Task Force (IETF) was formed to assist in the transition from IPv4 to IPv6 Dual Stack, Header Translation and Tunneling. The mechanisms employed in this transition consist of changes to protocol mechanisms affecting hosts and routers, addressing and deployment, that are designed to avoid mishap and facilitate a smooth transition from IPv4 to IPv6. Given the inevitability of adopting IPv6, this paper focuses on a detailed examination of the transition techniques and its associated benefits and possible shortcomings. Furthermore, the security threats for each transition technique are overviewed.

AB - There is a growing perception among communications experts that IPv6 and its associated protocols is set to soon replace the current IP version. This is somewhat interesting given that general adoption of IPv6 has been slow. Perhaps this can be explained by the short-term fixes to IPv4 address including classless addressing and NAT. Because of these short-term solutions in addition that IPv4 is not capable to manage the growth of information systems, particularly the growth of internet technologies and services including cloud computing, mobile IP, IP telephony, and IP-capable mobile telephony, all of which necessitate the use of IPv6. There is however a realization that the transformation must be gradual and properly guided and managed. To this end, the Internet Engineering Task Force (IETF) was formed to assist in the transition from IPv4 to IPv6 Dual Stack, Header Translation and Tunneling. The mechanisms employed in this transition consist of changes to protocol mechanisms affecting hosts and routers, addressing and deployment, that are designed to avoid mishap and facilitate a smooth transition from IPv4 to IPv6. Given the inevitability of adopting IPv6, this paper focuses on a detailed examination of the transition techniques and its associated benefits and possible shortcomings. Furthermore, the security threats for each transition technique are overviewed.

KW - Dual Stack

KW - IPv4

KW - IPv6

KW - Translation

KW - Tunneling

UR - http://www.scopus.com/inward/record.url?scp=84990954754&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84990954754&partnerID=8YFLogxK

U2 - 10.1109/ICE2T.2014.7006224

DO - 10.1109/ICE2T.2014.7006224

M3 - Conference contribution

VL - 2014-August

SP - 83

EP - 88

BT - 2014 4th International Conference on Engineering Technology and Technopreneuship, ICE2T 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -