Will IPv6 bring better security?

被引:8
|
作者
Szigeti, S [1 ]
Risztics, P [1 ]
机构
[1] Budapest Univ Technol & Econ, Ctr Informat Technol, Budapest, Hungary
关键词
D O I
10.1109/EURMIC.2004.1333418
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The deployment of the next generation Internet Protocol (IPv6) has already started. There were great expectations about the features of the new protocol, one of which was better network security. IPv6 provides network level security via IPSec. While this is an obvious improvement in security, its universal usability is still questionable. This paper examines the security aspects of IPv6, whether it will change the security of the Internet.
引用
收藏
页码:532 / 537
页数:6
相关论文
共 50 条
  • [1] Security on IPv6
    Yang, Dequan
    Song, Xu
    Guo, Qiao
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 3, 2010, : 323 - 326
  • [2] IPv6 Security Challenges
    Caicedo, Carlos E.
    Joshi, James B. D.
    Tuladhar, Summit R.
    [J]. COMPUTER, 2009, 42 (02) : 36 - 42
  • [3] Mobile IPv6 security
    Kempf, J
    Arkko, J
    Nikander, P
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 389 - 414
  • [4] Testing IPv6 security
    Ball, A
    Cole, DG
    Nelson, NL
    [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 235 - 241
  • [5] IPv6 Security and Forensics
    Nicolls, Vincent
    Le-Khac, Nhien-An
    Chen, Lei
    Scanlon, Mark
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 743 - 748
  • [6] Mobile IPv6 security
    Aura, T
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 215 - 228
  • [7] Mobile IPv6 Security
    James Kempf
    Jari Arkko
    Pekka Nikander
    [J]. Wireless Personal Communications, 2004, 29 : 389 - 414
  • [8] Enhancing Security in Mobile IPv6
    Modares, Hero
    Moravejosharieh, Amirhossein
    Bin Salleh, Rosli
    Lloret, Jaime
    [J]. ETRI JOURNAL, 2014, 36 (01) : 51 - 61
  • [9] Research of security and NIDS of IPv6
    Huang, Shuqiang
    Zhou, Yuyu
    Li, Chao
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 921 - 925
  • [10] Analysis of IPv6 Security Mechanism
    Miao Fang
    Gu Yue-sheng
    Chen Jun
    [J]. 2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 183 - 185