Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Universidade do Minh...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1109/iemtro...
Article . 2021 . Peer-reviewed
License: IEEE Copyright
Data sources: Crossref
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Roadmap of Security threats between IPv4/IPv6

Authors: Abusafat, Fadi; Pereira, Tiago; Santos, Henrique;

Roadmap of Security threats between IPv4/IPv6

Abstract

The idea of the Internet of Things is to connect every physical device with internet. Each device should be presented by a unique address of Internet Protocol. There are two versions of IP known by IPv4 and IPv6. IPv4 assumed to cover whole network interfaces. Since the appearance of IoT, number of connected devices increased sharply and IPv4 could not afford this enormous numbers. Therefore, the solution came by introduced IPv6 to afford this massive number in IoT environment. Despite IPv4 provided interoperability with several types of protocols, robust and easy implementation but it's vulnerable for several kinds of attacks. Therefore, IPv6 introduced while having security protocols such as IPsec, neighbour discovery protocol and Secure Neighbour Discovery Protocol. However, due to IPv4 still working as well as updated with security components, there is need to interact between both versions of protocol. Therefore, there is need for interacting mechanism between both them. These mechanisms made implantation of IPv6 complicated and consumed more resources. Besides, there are threats for attacks. Therefore, security features in IPv6 are not enough and there is need for a new defense line that can secure network services and IP from attacks. Intrusion Detection mechanism considered good mechanism to provide protection due to it works based on two levels Host and Network. Besides, it uses several security approaches such as signature-based and network-based. However, considering this tool as it's in IoT environment will not bring the light of security in IoT. Therefore, it should be developed while considering features of IoT devices to secure IoT environment. To achieve this, we have to investigate every feature, component and operation in network. This review paper aims to analyse difference between IPv4/IPv6 and point out security threats related to IP in both versions. Also, identifying main security threats to IPv6.

Country
Portugal
Related Organizations
Keywords

Science & Technology, IPv6, IPv4, ICMPv6, IP security threats, Network layer attacks

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    2
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 5
    download downloads 1
  • 5
    views
    1
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
2
Average
Average
Average
5
1
Upload OA version
Are you the author? Do you have the OA version of this publication?