L. Almeida, Pedro Carvalho, Camilla Jacome, Michael A. F. Monteiro, Miguel R. B. Cabral
{"title":"近二十年对IPv6安全的深入分析","authors":"L. Almeida, Pedro Carvalho, Camilla Jacome, Michael A. F. Monteiro, Miguel R. B. Cabral","doi":"10.1109/LATINCOM.2018.8613223","DOIUrl":null,"url":null,"abstract":"The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.","PeriodicalId":332646,"journal":{"name":"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An In-Depth Analysis of the Last Twenty Years About IPv6 Security\",\"authors\":\"L. Almeida, Pedro Carvalho, Camilla Jacome, Michael A. F. Monteiro, Miguel R. B. Cabral\",\"doi\":\"10.1109/LATINCOM.2018.8613223\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.\",\"PeriodicalId\":332646,\"journal\":{\"name\":\"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LATINCOM.2018.8613223\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LATINCOM.2018.8613223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An In-Depth Analysis of the Last Twenty Years About IPv6 Security
The IPv6 protocol was designed to be the successor to IPv4, bringing mainly improvements to address space and security aspects. Conducting a study that is capable of analyzing the state-of-the-art of security aspects related to IPv6 is important to understand the direction of research and the gaps still existing in the area. This paper aims to present an in-depth analysis of the published studies on IPv6 security in the last twenty years. Research questions were created in order to obtain answers that help in understanding the area. A systematic mapping study was carried out, in which it was possible to relate aspects related to the security of the IPv6 protocol.