2014
DOI: 10.3390/fi6010001
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Internet Protocol (IPv6) Security Guidelines

Abstract: The next generation of the Internet Protocol (IPv6) is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 229 publications
0
5
0
Order By: Relevance
“…In healthcare systems, there is a need to protect the confidentiality and privacy of healthcare records, since there are several people who may have access to them. Only authorised personal with access rights depending on their roles is permitted to access these healthcare records [ 26 ].…”
Section: New Mechanisms In Detailmentioning
confidence: 99%
See 1 more Smart Citation
“…In healthcare systems, there is a need to protect the confidentiality and privacy of healthcare records, since there are several people who may have access to them. Only authorised personal with access rights depending on their roles is permitted to access these healthcare records [ 26 ].…”
Section: New Mechanisms In Detailmentioning
confidence: 99%
“…The design of the developed capability-based system is based on the flexible approach of IPv6, which uses both unique ID as well as location as a mechanism to allow communications between objects [ 26 ]. This approach improves performance and increases security [ 27 ].…”
Section: New Mechanisms In Detailmentioning
confidence: 99%
“…In this proposed framework, the capability system is based on the address space of IPv6. IPv6 is the latest version of the Internet Protocol (IP) [29]. It provides an identification and location for every computer, mobile phone, and any other mobile device on networks across the internet through its IP address.…”
Section: Key Mechanismsmentioning
confidence: 99%
“…The IPv6 is the expected successor to the IPv4 where the main goal of the IPv6 is to offer larger addressing space compared with the IPv4 [9]. Although IPv6 provides built-in security mechanism via IP Security (IPSec), the IPv6 is still vulnerable to the security threats: firewall evasion by fragmentation, header manipulation, smurf attack (broadcast amplification attack), host initialisation attack and reconnaissance attack [8].…”
Section: Mipv6mentioning
confidence: 99%