Mobile IPv6 vertical handover specifications, threats, and mitigation methods: A survey

S Praptodiyono, T Firmansyah… - Security and …, 2020 - Wiley Online Library
Internet users have grown substantially over the last decade, especially following the
emergence of mobile technology. Most Internet connections nowadays are accessed using …

Flow-based IDS for ICMPv6-based DDoS attacks detection

OE Elejla, M Anbar, B Belaton, BO Alijla - Arabian Journal for Science and …, 2018 - Springer
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …

Security mechanism for IPv6 stateless address autoconfiguration

S Praptodiyono, RK Murugesan… - … Optics, Micro Electro …, 2015 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) was designed and developed to solve the problem of
exhaustion of current Internet address. IPv6 also introduces a number of benefits including …

Towards a new algorithm to optimize IPv6 neighbor discovery security for small objects networks

A El Ksimi, C Leghris - Security and Communication Networks, 2018 - Wiley Online Library
In order to verify the uniqueness of link‐local or unicast addresses, nodes must perform a
Duplicate Address Detection process before using them. However, this process is subject to …

Leveraging Secure Hash Algorithm for Securing IPv6 Protocols SLAAC and DAD.

JR Machana, G Narsimha - Turkish Online Journal of …, 2021 - search.ebscohost.com
In the recent past, the IPv6 protocol has gained importance in the industry. The IPv6 protocol
is considered more reliable and secured when compared to its 32-bit counterpart. The IPv6 …

Review of IPv6 Mitigation Techniques for Enterprise Local Area Networks

NA Assotally - 2023 International Conference on Engineering …, 2023 - ieeexplore.ieee.org
IPv6 was built to improve on existing IPv4 protocol and it is known to have multiple benefits
over IPv4. One of the biggest advantage is the large address space which would solve the …

The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on …

AM Shabalin, EA Kaliberda - 2017 Dynamics of Systems …, 2017 - ieeexplore.ieee.org
The article issue is the enterprise information protection within the internet of things concept.
The aim of research is to develop arrangements set to ensure secure enterprise IPv6 …

Организация комплекса мер по обеспечению безопасной работы IPv6-сети предприятия средствами современного коммутационного оборудования (на …

АМ Шабалин, ЕА Калиберда - Динамика систем, механизмов и …, 2017 - cyberleninka.ru
В статье рассматриваются вопросы защиты информации на предприятии в рамках
концепции Интернета вещей. Целью исследования является разработка комплекса …

[PDF][PDF] A Novel Central Arbiter to Mitigate Denial of Service Attacks on Duplicate Address Detection in IPv6 Networks

SS Tomar, A Rawat, PD Vyavahare, S Tokekar - personales.upv.es
(IPv6) network is susceptible to Denial of Service (DoS) attack in the Duplicate Address
Detection (DAD) phase of the IP address assignment process. A lot of research work is …

[PDF][PDF] Arquitectura de Seguridad Profunda Contra Explotación de Vulnerabilidades Modernas Empleando AES-256 para el Modelo TCP/IP En Redes de Datos IP

T Nagata Bolivar - 2018 - repositorio.ucsm.edu.pe
En la actualidad el avance de las distintas tecnologías no solo trae consigo distintos
beneficios sino también problemas de seguridad de alto riesgo que deben ser controlados …