The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
En raison de l’épuisement du pool d’adresses IPv4 publiques, la transition vers IPv6 est devenue inévitable. Cependant, cette transition en cours prend du temps et les deux versions incompatibles du protocole Internet doivent cohabiter. Différentes technologies de transition IPv6 ont été développées, qui peuvent être utilisées pour permettre la communication dans divers scénarios, mais elles impliquent également des problèmes de sécurité supplémentaires. Dans cet article, nous présentons d’abord notre méthodologie d’analyse de la sécurité des technologies de transition IPv6 en un mot. Ensuite, nous développons une méthode de classification prioritaire pour le classement des différentes technologies de transition IPv6 et de leurs implémentations les plus importantes, afin que les vulnérabilités des plus cruciales puissent être examinées en premier. Ensuite, nous menons une étude complète des technologies de transition IPv6 existantes en décrivant leurs scénarios d'application et les bases de leur fonctionnement et nous déterminons également les priorités de leur analyse de sécurité selon notre système de classement. Enfin, nous montrons que les technologies de transition IPv6 auxquelles nous avons donné une priorité élevée couvrent les scénarios les plus pertinents.
Gábor LENCSE
Budapest University of Technology and Economics
Youki KADOBAYASHI
Nara Institute of Science and Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Gábor LENCSE, Youki KADOBAYASHI, "Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis" in IEICE TRANSACTIONS on Communications,
vol. E102-B, no. 10, pp. 2021-2035, October 2019, doi: 10.1587/transcom.2018EBR0002.
Abstract: Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2018EBR0002/_p
Copier
@ARTICLE{e102-b_10_2021,
author={Gábor LENCSE, Youki KADOBAYASHI, },
journal={IEICE TRANSACTIONS on Communications},
title={Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis},
year={2019},
volume={E102-B},
number={10},
pages={2021-2035},
abstract={Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.},
keywords={},
doi={10.1587/transcom.2018EBR0002},
ISSN={1745-1345},
month={October},}
Copier
TY - JOUR
TI - Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis
T2 - IEICE TRANSACTIONS on Communications
SP - 2021
EP - 2035
AU - Gábor LENCSE
AU - Youki KADOBAYASHI
PY - 2019
DO - 10.1587/transcom.2018EBR0002
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E102-B
IS - 10
JA - IEICE TRANSACTIONS on Communications
Y1 - October 2019
AB - Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, this ongoing transition is taking a long time, and the two incompatible versions of the Internet Protocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they also involve additional security issues. In this paper, first, we introduce our methodology for analyzing the security of IPv6 transition technologies in a nutshell. Then, we develop a priority classification method for the ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be examined first. Next, we conduct a comprehensive survey of the existing IPv6 transition technologies by describing their application scenarios and the basics of their operation and we also determine the priorities of their security analysis according to our ranking system. Finally, we show that those IPv6 transition technologies that we gave high priorities, cover the most relevant scenarios.
ER -