The Fourth International Workshop on Trusted Collaboration

Research Article

In-depth analysis of IPv6 security posture

Download763 downloads
  • @INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8393,
        author={Abdur Rahim Choudhary},
        title={In-depth analysis of IPv6 security posture},
        proceedings={The Fourth International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2009},
        month={12},
        keywords={Explosions IP networks Internet Joining processes North America Pressing Protocols Radiofrequency identification Security Testing},
        doi={10.4108/ICST.COLLABORATECOM2009.8393}
    }
    
  • Abdur Rahim Choudhary
    Year: 2009
    In-depth analysis of IPv6 security posture
    TRUSTCOL
    ICST
    DOI: 10.4108/ICST.COLLABORATECOM2009.8393
Abdur Rahim Choudhary1,*
  • 1: Scientist, Serco North America, 12012 Sunset Hills Rd, Suite 600, Reston, VA 20190, USA, 01-301-262-3224
*Contact email: rahim.choudhary@serco-na.com

Abstract

The version 6 of Internet Protocol (IPv6) is being gradually deployed worldwide. This paper analyzes the security of IPv6 protocol. is the analysis concludes that serious security vulnerabilities exist that are IPv6 specific. Therefore additional security measures are needed and more capable security management tools are required in IPv6 networks in order to achieve a security posture at parity with that of the IPv4 networks.