L. Almeida, Pedro Carvalho, Camilla Jacome, Michael A. F. Monteiro, Miguel R. B. Cabral
{"title":"An In-Depth Analysis of the Last Twenty Years About IPv6 Security","authors":"L. Almeida, Pedro Carvalho, Camilla Jacome, Michael A. F. Monteiro, Miguel R. B. Cabral","doi":"10.1109/LATINCOM.2018.8613223","DOIUrl":null,"url":null,"abstract":"The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.","PeriodicalId":332646,"journal":{"name":"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LATINCOM.2018.8613223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.