Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.
Gábor LENCSE
Budapest University of Technology and Economics
Youki KADOBAYASHI
Nara Institute of Science and Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Gábor LENCSE, Youki KADOBAYASHI, "Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis" in IEICE TRANSACTIONS on Communications,
vol. E102-B, no. 10, pp. 2021-2035, October 2019, doi: 10.1587/transcom.2018EBR0002.
Abstract: Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2018EBR0002/_p
Copy
@ARTICLE{e102-b_10_2021,
author={Gábor LENCSE, Youki KADOBAYASHI, },
journal={IEICE TRANSACTIONS on Communications},
title={Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis},
year={2019},
volume={E102-B},
number={10},
pages={2021-2035},
abstract={Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.},
keywords={},
doi={10.1587/transcom.2018EBR0002},
ISSN={1745-1345},
month={October},}
Copy
TY - JOUR
TI - Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis
T2 - IEICE TRANSACTIONS on Communications
SP - 2021
EP - 2035
AU - Gábor LENCSE
AU - Youki KADOBAYASHI
PY - 2019
DO - 10.1587/transcom.2018EBR0002
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E102-B
IS - 10
JA - IEICE TRANSACTIONS on Communications
Y1 - October 2019
AB - Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.
ER -