Please use this identifier to cite or link to this item:
Title: The current state of IPv6 : transition and security
Authors: Ghalloub, Kamala
Advisors: Haddad, Nicolas K. 
Subjects: Computer networks
TCP/IP (Computer network protocol)
Issue Date: 2018
With the Internet growth, the shift to a newer IP protocol version is now unavoidable and really crucial. The exhaustion of the IPv4 addresses has urged the start of the IPv6 transition. The main goal of the transition is to provide the users with an uninterrupted availability; the IPv4 and IPv6 protocols are not compatible, one cannot directly replace the other, which is why they have to exist side-by-side for a considerable period of time. Many transitioning procedures are recommended to make the transition less troubling, however these procedures are extremely problematic. On the other hand, from the security point of view, the IPv6 protocol has indeed solved many of the IPv4 vulnerabilities, however not all of the IPv4 security attacks were tackled by IPv6. In fact, the IPv6 protocol has introduced many security exposures, especially with the existence of complications that the transitional techniques create. These concerns have made the IPv6 protocol in urgent need of many security defense layers, and new, and advanced, countermeasures. This thesis explains the IPv6 protocol features, and how it differs from the IPv4 protocol. It also presents the concepts behind each transitional procedure in the third chapter, and studies the disadvantage, and benefit, of each technique. Then, in the fourth chapter, the study displays the security improvements the IPv6 protocol has accomplished over the IPv4 protocol, and the concerns it has generated. Some recommendations are also suggested on how to make the IPv6 protocol more secure. Finally, after comparing all transitioning techniques, the best technique is proposed, and future research subjects are proposed to help enhance and correct the IPv6 protocol, and make it more reliable.
Includes bibliographical references (p. 73-79).

Supervised by Dr. Nicolas Haddad.
Rights: This object is protected by copyright, and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the object beyond the personal and educational use exceptions must be obtained from the copyright holder
Ezproxy URL: Link to full text
Type: Thesis
Appears in Collections:UOB Theses and Projects

Show full item record

Record view(s)

checked on May 18, 2021

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.