To see the other types of publications on this topic, follow the link: Internet Protocol Version 6.

Journal articles on the topic 'Internet Protocol Version 6'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet Protocol Version 6.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Frankel, Sheila, and David Green. "Internet Protocol Version 6." IEEE Security & Privacy Magazine 6, no. 3 (2008): 83–86. http://dx.doi.org/10.1109/msp.2008.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Batra, Ayushi. "Internet Protocol version 6 (IPv6)." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 1869–73. http://dx.doi.org/10.22214/ijraset.2017.11270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, D. C., and D. L. Lough. "The Internet Protocol version 6." IEEE Potentials 17, no. 2 (1998): 11–12. http://dx.doi.org/10.1109/45.666638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Henry, Susanna S., B. Vijay Kumar, V. Santhosh Kumar, and Gurwinder Singh. "Protocol Verification of Translation in Mobile Internet Protocol Version 4 and 6." Journal of Computers 11, no. 2 (2016): 149–58. http://dx.doi.org/10.17706/jcp.11.2.149-158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Babatunde, Olabenjo, and Omar Al-Debagy. "A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)." International Journal of Computer Trends and Technology 13, no. 1 (2014): 10–13. http://dx.doi.org/10.14445/22312803/ijctt-v13p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan et. al., Firdous Ahmad. "Performance Analysis of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) over MPLS." International Journal of Computing & Network Technology 02, no. 03 (2014): 91–99. http://dx.doi.org/10.12785/ijcnt/020303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hossain, Md, Jesmin Binti, and Md Uddin. "A Review Paper on IPv4 and IPv6: A Comprehensive Survey." American Journal of Computer Science and Technology 7, no. 4 (2024): 170–75. http://dx.doi.org/10.11648/j.ajcst.20240704.14.

Full text
Abstract:
Even though more customers are regularly coming to the Internet, IPv4 addresses have been reduced by the Internet Assigned Numbers Authority (IANA) and have been deactivated in domain name registries (RIRs). IPv6, being the sole important next-generation Internet protocol, has yet to be fully developed and deployed, owing to the lack of a scheme that might address the transfer of IPv4 resources to IPv6 networks as well as collective communication between the two incompatible protocols. The Transmission Control Protocol/Internet protocol version 4 (TCP/IPv4) addresses have been reported as bein
APA, Harvard, Vancouver, ISO, and other styles
8

Hassan. "ENHANCED ENCAPSULATED SECURITY PAYLOAD A NEW MECHANISM TO SECURE INTERNET PROTOCOL VERSION 6 OVER INTERNET PROTOCOL VERSION 4." Journal of Computer Science 10, no. 7 (2014): 1344–54. http://dx.doi.org/10.3844/jcssp.2014.1344.1354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Machado, Iar, Michael Stanton, and Tiago Salmito. "Internet Protocol Version 6 (IPv6) - Internet Protocol Version 4 (IPv4) Network Address, Port & Protocol Translation And Multithreaded DNS-Application Gateway." Proceedings of the Asia-Pacific Advanced Network 31 (June 1, 2011): 12. http://dx.doi.org/10.7125/apan.31.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Abhinav, Navpreet Singh, and Vinay Bajpai. "Internet Protocol Version 6 (IPv6) - Internet Protocol Version 4 (IPv4) Network Address, Port & Protocol Translation And Multithreaded DNS-Application Gateway." Proceedings of the Asia-Pacific Advanced Network 31 (June 1, 2011): 12. http://dx.doi.org/10.7125/apan.31.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Budiono, Fahrizal Lukman, and Riza Azmi. "Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia." Buletin Pos dan Telekomunikasi 9, no. 2 (2015): 149. http://dx.doi.org/10.17933/bpostel.2011.090202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kaur, Rajveer, and Raman Maini. "Study of Various Issues of Internet Protocol Version 6." International Journal of Computer Applications 12, no. 1 (2010): 19–23. http://dx.doi.org/10.5120/1642-2207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Alnile, Naseef Husam Mohammad, Yasmin Makki Mohialden, Majd S. Ahmed, and Majd S. Ahmed. "A comparative study of IP Versions 4, 5, and 6." Journal La Multiapp 2, no. 3 (2021): 10–15. http://dx.doi.org/10.37899/journallamultiapp.v2i3.390.

Full text
Abstract:
This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the differences between them and which protocol is more suitable for the future of the internet, among other things. Through this research, we have established the most advantageous characteristics of these protocols, as well as the specific elements that each protocol uses to allow the internet network to operate at maximum capacity. The main aim of this study is to discover which of the internet protocols, IPv4, IPv5, or IPv6, is the most widely used. IPv4 is the most widely used protocol, followed by IPv5. Th
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Whai‐En, and Ssu‐Hsien Li. "Client‐based Internet Protocol version 4‐Internet Protocol version 6 translation mechanism for Session Initiation Protocol multimedia services in next generation networks." IET Networks 2, no. 3 (2013): 115–23. http://dx.doi.org/10.1049/iet-net.2012.0084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Blessing, Chiadikobi, and Oghenekaro Asagba Prince. "IMPLEMENTATION OF OPEN SHORTEST PATH FIRST USING INTERNET PROTOCOL VERSION 6." International Journal of Pure & Applied Mathematical Research 1, no. 1 (2017): 51–62. https://doi.org/10.5281/zenodo.10823956.

Full text
Abstract:
Abstract <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Open Shortest Path First (OSPF) is one of the routing protocols used by a router to dynamically determine the route of a packet (user information) through an internet work. This paper looked at an Inter-Campus network system which was Configuration using IP Version 6 to Implement Open Shortest Path First. The methodology adopted for this research was the Object Oriented Analysis and Design Model (OOADM) and the Inter-Campus network system was designed using Cisco technology. In this paper, OSPF was used to test-run its features and performance
APA, Harvard, Vancouver, ISO, and other styles
16

Bansode, Rama. "A Review of Internet Protocol Version 6 (IPv6) Security Network." Bioscience Biotechnology Research Communications 14, no. 5 (2021): 21–26. http://dx.doi.org/10.21786/bbrc/14.5/4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, D. C., D. L. Lough, S. F. Midkiff, N. J. Davis, and P. E. Benchoff. "The next generation of the Internet: aspects of the Internet protocol version 6." IEEE Network 12, no. 1 (1998): 28–33. http://dx.doi.org/10.1109/65.660004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dasmen, Rahmat Novrianda, Timur Dali Purwanto, Agung Wahyudi, Muhammad Nazhrun Nabil, and Albirr DoKoety. "Design and Implementation Internet Protocol Version 6 (IPv6) Pada Jaringan Komputer SMP Muhammadiyah 6 Palembang." DoubleClick: Journal of Computer and Information Technology 6, no. 1 (2022): 1. http://dx.doi.org/10.25273/doubleclick.v6i1.11738.

Full text
Abstract:
&lt;span lang="EN-US"&gt;IPv6 dimaksudkan untuk mengizinkan klien untuk tidak bermain-main dengan pengaturan alamat Internet Protokol. PC klien yang terkait dengan organisasi IPv6 akan mendapatkan alamat Internet Protokol langsung dari switch sangat mirip dengan DHCP, sehingga nantinya server DHCP umumnya tidak diperlukan. Konfigurasi otomatis akan sangat membantu untuk peralatan web portabel karena klien tidak dipusingkan dengan pengaturan saat bertukar tempat dan organisasi. Dalam tinjauan ini, rencana IPv6 dilakukan untuk antarmuka jaringan web bersama dengan pemanfaatan pedoman yang telah
APA, Harvard, Vancouver, ISO, and other styles
19

Venkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.

Full text
Abstract:
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with
APA, Harvard, Vancouver, ISO, and other styles
20

Chudzik, Krzysztof, and Jan Kwiatkowski. "IPv6 in Virtualization Environments." Journal of Telecommunications and Information Technology, no. 2 (June 27, 2023): 16–23. http://dx.doi.org/10.26636/jtit.2011.2.1140.

Full text
Abstract:
The primary network layer protocol on which theoperation of most computer networks is based, including the Internet is the Internet protocol version 4 (IPv4). Due to the limitations of this protocol, it is becoming increasingly widespread use of the Internet protocol version 6 (IPv6). The IPv6 implements some new features not available in IPv4. The paper provides a short overview of the key features of IPv6 and discussed the possible levels of network virtualization. The research environment to testing the level of support for IPv6 protocol by virtualization environments is proposed. The resul
APA, Harvard, Vancouver, ISO, and other styles
21

Khaleel Ibrahim Saihab, Ahmed, and Nazhat Saeed Abdulrazaq. "Building a Security System Based on Internet Protocol Version 6 Routing Header." Journal of Engineering and Applied Sciences 14, no. 11 (2019): 3674–78. http://dx.doi.org/10.36478/jeasci.2019.3674.3678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ben Saad, Leila, Cedric Chauvenet, and Bernard Tourancheau. "IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building." Energy 44, no. 1 (2012): 447–57. http://dx.doi.org/10.1016/j.energy.2012.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dua, Arti, Vinita Jindal, and Punam Bedi. "Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6." IEEE Access 10 (2022): 110661–75. http://dx.doi.org/10.1109/access.2022.3215132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Scheffler, Thomas. "IP - Next Generation a New Version for the Internet Protocol." IFAC Proceedings Volumes 34, no. 9 (2001): 47–51. http://dx.doi.org/10.1016/s1474-6670(17)41680-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pirovano, Umberto, Oriol Fusté, and Anna Calveras. "Leveraging IPv6 and ICMPv6 for Delay-Tolerant Networking in Deep Space." Technologies 13, no. 4 (2025): 163. https://doi.org/10.3390/technologies13040163.

Full text
Abstract:
Communications in delay-tolerant networking (DTN) environments like deep space face significant challenges due to immense distances and the intermittent nature of links. Overcoming these issues requires moving beyond the assumptions of immediacy and reliability that underpin traditional terrestrial Internet Protocol (IP) networks. Historically, deep-space networks have relied on custom architectures or protocols like the Bundle Protocol (BP) to address these challenges; however, such solutions impose the constraint that nodes must implement the chosen protocol for proper operation, thereby not
APA, Harvard, Vancouver, ISO, and other styles
26

Bdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.

Full text
Abstract:
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such a
APA, Harvard, Vancouver, ISO, and other styles
27

Adnan, Hasan Bdair AIghuraibawi, Abdullah Rosni, Manickam Selvakumar, and Abdi Alkareem Alyasseri Zaid. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5216–28. https://doi.org/10.11591/ijece.v11i6.pp5216-5228.

Full text
Abstract:
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such a
APA, Harvard, Vancouver, ISO, and other styles
28

Hamid, Zunainah, Sharipah Daud, Intan Shafinaz Abd. Razak, and Nurzurawani Abd. Razak. "A Comparative Study between IPv4 and IPv6." ANP Journal Of Social Sciences And Humanities 2, no. 1 (2021): 68–72. http://dx.doi.org/10.53797/anpjssh.v2i1.9.2021.

Full text
Abstract:
The transition between the Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) will be a long process during both protocol coexists and it unreasonable to expect that many millions of IPv4 nodes will be converted overnight. Mobility is becoming ubiquitous nowadays. This paper has described about a background study of IPv4 and IPv6, the needs of IPv6, transition mechanisms in the various architectures, and comparison of the IPv4 and IPv6 in two major areas; header format and transition mechanism. Then, the transformation of IPv4 to IPv6 addressing by using tunnel and dual
APA, Harvard, Vancouver, ISO, and other styles
29

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.5673.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected
APA, Harvard, Vancouver, ISO, and other styles
30

Samad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.9337.

Full text
Abstract:
The Internet has been an integral part of the Information and Communication Technology (ICT) community in recent years. New internet users have been growing steadily over the years. This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. The existing Internet Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6. The changeover from IPv4 to IPv6 is expected to be implemented progressively. During this transition period, these two protocols are expected
APA, Harvard, Vancouver, ISO, and other styles
31

Parsaei, Mohammad Reza, Ahmad Reza Parnian, Samaneh Miri Rostami, and Reza Javidan. "RPL LOAD BALANCING IN INTERNET OF THINGS." IIUM Engineering Journal 18, no. 2 (2017): 137–50. http://dx.doi.org/10.31436/iiumej.v18i2.702.

Full text
Abstract:
ABSTRACT:Â The wide address space provided by Internet Protocol version 6 (IPv6) lets any thing to be identified uniquely. consistency of the modified version of IPv6 protocol stack with smart objects, facilitated the Internet interconnection of the networks of smart objects and introduced Internet of things. A smart object is a small micro-electronic device that consists of a communication device, a small microprocessor and a sensor or an actuator. A network made of such devices is called low-power and lossy network. RPL routing protocol that is consistent to IPv6, is designed to be used in t
APA, Harvard, Vancouver, ISO, and other styles
32

Supriyanto, Kumar Murugesan Raja, and Ramadass Sureswaran. "REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS." International Journal of Network Security & Its Applications (IJNSA) 4, no. 6 (2012): 173–85. https://doi.org/10.5281/zenodo.3760624.

Full text
Abstract:
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv
APA, Harvard, Vancouver, ISO, and other styles
33

Khudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (2019): 442. http://dx.doi.org/10.3390/electronics8040442.

Full text
Abstract:
The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor
APA, Harvard, Vancouver, ISO, and other styles
34

A. Naagas, Marlon, and Anazel P. Gamilla. "Denial of service attack: an analysis to IPv6 extension headers security nightmares." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2922. http://dx.doi.org/10.11591/ijece.v12i3.pp2922-2930.

Full text
Abstract:
Dealing with scarcity issues of Internet protocol version 4 (IPv4), internet engineering task force (IETF) developed Internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that wil
APA, Harvard, Vancouver, ISO, and other styles
35

Marlon, A. Naagas, and P. Gamilla Anazel. "Denial of service attack: an analysis to IPv6 extension headers security nightmares." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2922–30. https://doi.org/10.11591/ijece.v12i3.pp2922-2930.

Full text
Abstract:
Dealing with scarcity issues of internet protocol version 4 (IPv4), internet engineering task force (IETF) developed internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that wil
APA, Harvard, Vancouver, ISO, and other styles
36

Supriyanto, IznanHusainy Hasbullah, RajaKumar Murugesan, and Sureswaran Ramadass. "Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods." IETE Technical Review 30, no. 1 (2013): 64. http://dx.doi.org/10.4103/0256-4602.107341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mir, Zubair Ahmad. "COMPARISON AND TRANSITION STUDY OF INTERNET PROTOCOL VERSION 4 & 6 (IPV4 &IPV6)." International Journal of Advanced Research in Computer Science 8, no. 7 (2017): 64–66. http://dx.doi.org/10.26483/ijarcs.v8i7.4210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Malekian, Reza, Abdul Hanan Abdullah, and Ning Ye. "Novel Packet Queuing Algorithm on Packet Delivery in Mobile Internet Protocol Version 6 Networks." Applied Mathematics & Information Sciences 7, no. 3 (2013): 881–87. http://dx.doi.org/10.12785/amis/070306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Firman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack detection by using epsilon g
APA, Harvard, Vancouver, ISO, and other styles
40

Hasan Kabla, Arkan Hammoodi, Mohammed Anbar, Shady Hamouda, et al. "Machine and deep learning techniques for detecting internet protocol version six attacks: a review." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5617. http://dx.doi.org/10.11591/ijece.v13i5.pp5617-5631.

Full text
Abstract:
&lt;span lang="EN-US"&gt;The rapid development of information and communication technologies has increased the demand for internet-facing devices that require publicly accessible internet protocol (IP) addresses, resulting in the depletion of internet protocol version 4 (IPv4) address space. As a result, internet protocol version 6 (IPv6) was designed to address this issue. However, IPv6 is still not widely used because of security concerns. An intrusion detection system (IDS) is one example of a security mechanism used to secure networks. Lately, the use of machine learning (ML) or deep learn
APA, Harvard, Vancouver, ISO, and other styles
41

Hammoodi, Hasan Kabla Arkan, Mohammed Anbar, Shady Hamouda, et al. "Machine and deep learning techniques for detecting internet protocol version six attacks: a review." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5617–31. https://doi.org/10.11591/ijece.v13i5.pp5617-5631.

Full text
Abstract:
The rapid development of information and communication technologies has increased the demand for internet-facing devices that require publicly accessible internet protocol (IP) addresses, resulting in the depletion of internet protocol version 4 (IPv4) address space. As a result, internet protocol version 6 (IPv6) was designed to address this issue. However, IPv6 is still not widely used because of security concerns. An intrusion detection system (IDS) is one example of a security mechanism used to secure networks. Lately, the use of machine learning (ML) or deep learning (DL) detection models
APA, Harvard, Vancouver, ISO, and other styles
42

Delgado, Rosa M. "Without IPv6, there is no digital transformation for healthcare." Technology and Health Care 30, no. 2 (2022): 505–8. http://dx.doi.org/10.3233/thc-213571.

Full text
Abstract:
BACKGROUND: Originally, digital healthcare was created to support underserved and rural patients gain access to health services. Phones, devices, and computers need IP (Internet Protocol) addresses to connect to the Internet. OBJECTIVE: This paper aims to study the close relationship between the Internet and the transformation of healthcare services. METHODS: The current protocol in use is the Internet Protocol version 4 (IPv4), whose number of Internet addresses has been globally exhausted. The Internet Protocol version 6 (IPv6) with 47 octillion unique addresses for every person on the plane
APA, Harvard, Vancouver, ISO, and other styles
43

Kriswantono, Andi, Arief Setyanto, and Suwanto Raharjo. "Kinerja Quagga Pada Routing BGP IPv6 Menggunakan Metode Dual Stack." Creative Information Technology Journal 5, no. 1 (2019): 28. http://dx.doi.org/10.24076/citec.2017v5i1.141.

Full text
Abstract:
Alamat jaringan yang digunakan saat ini adalah IPv4 (Internet Protocol v4), perkembangan jaringan menuju IoT (Internet of Think) meningkatkan kebutuhan akan alamat IP (Internet Protocol. Solusi terkait masalah IP adalah dengan melakukan migrasi ke alamat IPv6 (Internet Protocol Version 6).Metode transisi IPv4 ke IPv6 menggunakan Dual Stack merupakan metode yang paling baik dan stabil untuk dapat diimplementasikan. Salah satu pertimbangan dari provider penyedia jasa dan jaringan internet dalam melakukan migrasi ke jaringan IPv6 adalah terkait dengan kinerja BGP (Border Gateway Protocol) yang me
APA, Harvard, Vancouver, ISO, and other styles
44

Tr, Reshmi, Anusha K, Sumathi V, and Pandiyarajan K. "THE IPV6 RESISTANCE - A SURVEY." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 321. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19747.

Full text
Abstract:
Internet Protocol Version 6 (IPv6) was developed in 1990 to overcome the shortage of IP Version 4 (IPv4) addresses. The world saw IP Version 6 as the next generation IP addressing and an innovative backbone for the Internet. Although more than twenty five years have passed since the development of IPv6, but still IPv6 is seen as new technology without drastic enhancements and has not been widely adopted. Even Information Technology giants fear the network transition to IPv6 backbone. This article analyses the reason for this resistance towards IPv6. A detailed study of the same has been conduc
APA, Harvard, Vancouver, ISO, and other styles
45

Daru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
&lt;span lang="EN-US"&gt;Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack det
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, Hyungsoo, Jaehwan Lee, Sanghyuck Nam, and Sangoh Park. "Efficient Heterogeneous Network-Routing Method Based on Dynamic Control Middleware for Cyber-Physical System." Journal of Sensors 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/3176967.

Full text
Abstract:
A cyber-physical system depends on stable control and interaction between the many systems and devices connected to the network. Dynamic control middleware, which considers the characteristics of a cyber-physical system, supports the dynamic search and control of devices existing on the global network using Internet protocol version 6 (IPv6). However, systems and devices may connect to a network using a variety of heterogeneous protocols, not just IPv6. To solve the problem of heterogeneous protocols, this paper proposes a routing technique which enables network devices to communicate using di
APA, Harvard, Vancouver, ISO, and other styles
47

Muthi, Ahmad Abdul, Rudi Hartono, and Agus Supriatman. "Implementasi Dan Evaluasi Perbandingan IPV4 dan IPV6 dalam Jaringan Lokal dengan Metode NDCLM." e-Jurnal JUSITI (Jurnal Sistem Informasi dan Teknologi Informasi) 14, no. 1 (2025): 91–103. https://doi.org/10.36774/jusiti.v14i1.1542.

Full text
Abstract:
Internet Protocol version 4 (IPv4) merupakan protokol jaringan yang paling banyak digunakan saat ini. Namun, IPv4 memiliki keterbatasan dalam hal jumlah alamat IP yang tersedia. Hal ini mendorong pengembangan Internet Protocol version 6 (IPv6) yang memiliki ruang alamat yang lebih besar dan fitur-fitur keamanan yang lebih canggih. Penelitian ini bertujuan untuk mengimplementasikan dan mengevaluasi perbandingan kinerja dan keamanan IPv4 dan IPv6 dalam jaringan lokal menggunakan metode NDLC (Network Depelovment Life Cycle). Dua jaringan lokal akan dibangun, satu dengan IPv4 dan satu lagi dengan
APA, Harvard, Vancouver, ISO, and other styles
48

Maanasaa, Sethuraman, and Mathi Senthilkumar. "Prevention of Denial-of-service in Next Generation Internet Protocol Mobility." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 1 (2018): 137–46. https://doi.org/10.11591/ijeecs.v12.i1.pp137-146.

Full text
Abstract:
Internet Protocol version 6 (IPv6) is a next-generation internet protocol that is devised to replace its predecessor, the IPv4. With the benefit of ample address space, flexible header extensions and its many specific features, IPv6 is the future of the Internet. A significant advantage of IPv6 is its capabilities in the domain of security and mobility, where it scores in comparison with its predecessor. One of the features specific to IPv6, such as the mandatory IPsec messaging or address auto-configuration, is the Neighbor Discovery Protocol (NDP). Even though the concept of security is more
APA, Harvard, Vancouver, ISO, and other styles
49

Shah, Junaid Latief, Heena Farooq Bhat, and Asif Iqbal Khan. "Towards IPv6 Migration and Challenges." International Journal of Technology Diffusion 10, no. 2 (2019): 83–96. http://dx.doi.org/10.4018/ijtd.2019040105.

Full text
Abstract:
The Internet, since its genesis in 1970's, has already become a global broadcasting potential for information dissemination and a channel for information collaboration and an interface between disparate users and their systems, separated by large geographical locations. The rate of growth of interconnected devices has been on exponential scale from the last decade. As of now, more than 5 billion devices are accessing the Internet. The Internet Protocol Version 4 (IPv4) which is a three decade old standard internetworking protocol using 32-bit address, fails to cater such a large number of host
APA, Harvard, Vancouver, ISO, and other styles
50

Aldmour, Ismat, Thair Al-Dala’in, Lelyzar Siregar, and Rahmat Budiarto. "SeamSAR: Seamless, Secure And Robust Handover Model for Mobile IPTV Network Using Enhanced FMIPv6." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 2 (2015): 371. http://dx.doi.org/10.11591/ijece.v5i2.pp371-378.

Full text
Abstract:
Multimedia becomes one of the most wanted content in the modern Internet world. Since the Mobile Internet Protocol version 6 (MIPv6) was proposed, many researchers have tried to develop a new protocol based on this technology in order to improve the performance of mobile multimedia services. The world is emerging toward the Mobile Internet Protocol Television (MIPTV) era where people are enabled to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper proposes a new model of secure and robust handover with low handover latency, called
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!