{"title":"IPv6中网络拓扑隐藏问题的研究","authors":"Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe","doi":"10.1109/ISCIT.2011.6092167","DOIUrl":null,"url":null,"abstract":"With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proposal on the concealment of the network topology in IPv6\",\"authors\":\"Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe\",\"doi\":\"10.1109/ISCIT.2011.6092167\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.\",\"PeriodicalId\":226552,\"journal\":{\"name\":\"2011 11th International Symposium on Communications & Information Technologies (ISCIT)\",\"volume\":\"134 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 11th International Symposium on Communications & Information Technologies (ISCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCIT.2011.6092167\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT.2011.6092167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proposal on the concealment of the network topology in IPv6
With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.