Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks

Alzaid, Wael and Issac, Biju (2016) Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks. International Journal of Business Data Communications and Networking, 12 (1). pp. 36-62. ISSN 1548-0631

Full text not available from this repository.
Official URL: http://dx.doi.org/10.4018/IJBDCN.2016010103

Abstract

IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4 to IPv6 which includes dual stack networks, tunnels and translation technologies. Within all of this, network security is an essential element and therefore requires special attention. This paper analyses two transition technologies which are dual stack and tunnel. Both technologies are implemented using Cisco Packet Tracer and GNS3. This work will also analyse the security issues of IPv6 to outline the most common vulnerabilities and security issues during the transition. Finally, the authors will design and implement the dual stack, automatic and manual tunnelling transition mechanisms using Riverbed Modeler simulation tool to analyse the performance and compare with the native IPv4 and IPv6 networks.

Item Type: Article
Uncontrolled Keywords: Dual Stack, Efficiency, IPv6, Performance analysis, Security attacks, Simulation, Transition schemes, Tunnelling
Subjects: G600 Software Engineering
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Paul Burns
Date Deposited: 01 Oct 2018 11:45
Last Modified: 11 Oct 2019 19:15
URI: http://nrl.northumbria.ac.uk/id/eprint/35961

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics