An In-Depth Analysis of the Last Twenty Years About IPv6 Security

The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.

[1]  Adauto Trigueiro de Almeida Filho Um mapeamento sistemático de mecanismos para guiar estudos empíricos em engenharia de software , 2011 .

[2]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[3]  Christoph Meinel,et al.  Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations , 2012, IEEE Security & Privacy.

[4]  Abdur Rahim Choudhary,et al.  Securing IPv6 network infrastructure: A new security model , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[5]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[6]  Rosilah Hassan,et al.  IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey , 2017, IEEE Access.

[7]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[8]  Justin Zobel,et al.  Writing for Computer Science , 2014, Springer London.