2022
DOI: 10.21123/bsj.2022.7312
|View full text |Cite
|
Sign up to set email alerts
|

IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines

Abstract: Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…In the current digital era, no organization is safe from the proliferation of cyber-attacks which occur on a daily basis. Cyber criminals are relentless in finding new ways to exploit security vulnerabilities in organizations at a global scale 1 .…”
Section: Introductionmentioning
confidence: 99%
“…In the current digital era, no organization is safe from the proliferation of cyber-attacks which occur on a daily basis. Cyber criminals are relentless in finding new ways to exploit security vulnerabilities in organizations at a global scale 1 .…”
Section: Introductionmentioning
confidence: 99%
“…It is a crucial tool in today's world, where information is exchanged online and stored in various digital formats. The need for encryption arises from the growing concern over data breaches and cyber-attacks that can compromise sensitive regarding the reference 1 . The use of encryption technology, such as Cypher, is therefore essential to safeguarding data integrity, confidentiality, and availability.…”
Section: Introductionmentioning
confidence: 99%
“…Despite these improvements in IPv6, some malicious attempts such as man-in-the-middle (MITM) attacks, replay attacks, impersonation attacks, and denial-of-service (DoS) attacks affect both IPv4 and IPv6 architectures and do not discriminate by appearance [14]. In an MITM attack, the adversary is involved between two communication parties secretly [15]. The authentication between two communication parties is compromised due to the MITM attack.…”
mentioning
confidence: 99%