IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
DOI:
https://doi.org/10.21123/bsj.2022.7312Keywords:
IPv6, IPv6 Deployment, IPv6 Security, PRISMA Guidelines, Systematic ReviewAbstract
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Received 10/4/2022
Accepted 4/8/2022
Published Online First 25/11/2022
References
Cui Y, Wu P, Xu M, Wu J, Lee YL, Durand A, et al. 4over6: network layer virtualization for IPv4-IPv6 coexistence. IEEE Network. 2012; 26(5): 44-8.
Javaid N, Sher A, Nasir H, Guizani N. Intelligence in IoT-based 5G networks: Opportunities and challenges. IEEE Commun. Mag. 2018; 56(10): 94-100.
Abdulzahra SA, Al-Qurabat AK, Idrees AK. “Compression-based Data Reduction Technique for IoT Sensor Networks”, Baghdad Sci J. 2021; 18(1): 1840198
Davies J. Understanding IPv6: Understanding IPv6 _p3: Pearson Education; 2012. Available from: https://www.amazon.com/Understanding-IPv6-_p3-ebook/dp/B00JDMPHT0
Google.com. IPv6 Capable Rate by country [Internet]. 2022 [update 2022 July 1; cited 2022 July 1]. Available from: https://stats.labs.apnic.net/ipv6.
Lencse G, Kadobayashi Y. Comprehensive survey of IPv6 transition technologies: A subjective classification for security analysis. IEICE Trans Commun. 2019; 102(10): 2021-35.
Khan AA, Ali SA. Network forensics investigation: Behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. Int J Electron Secur Digit Forensics. 2021;1 3(6): 600-11.
Abdulla SA. Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms. Int J Netw Secur. 2017; 12(2): 83-102.
Al-Ani AK, Anbar M, Manickam S, Wey CY, Leau Y-B, Al-Ani A. Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements. Arab J Sci Eng. 2019; 44(4): 3745-63.
Anbar M, Abdullah R, Saad R, Alomari E, Alsaleem S. Review of security vulnerabilities in the IPv6 neighbor discovery protocol. Inform Sci-Appl.(ICISA). 2016 : 603-612. Springer, Singapore.
Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N. Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc. 2021 Feb 19; 23(sup1): S47-59.
Dawadi BR, Rawat DB, Joshi SR, Manzoni P, Keitsch MM. Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network. Int J Netw Manag. 2020: e2145.
Moher D, Liberati A, Tetzlaff J, Altman DG. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Int J Surg. 2010; 8(5): 336-41.
Supriyanto, Hasbullah IH, Murugesan RK, Ramadass S. Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods. IETE Tech Rev. 2013; 30(1): 64-71.
Modares H, Moravejosharieh A, Lloret J, Salleh R. A survey of secure protocols in mobile IPv6. J Netw Comput Appl. 2014; 39: 351-68.
Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput Secur. 2018 Aug 1; 77: 397-411.
Allely CS. Understanding and recognising the female phenotype of autism spectrum disorder and the ‘camouflage’hypothesis: A systematic PRISMA review. Adv Autism. 2019; 5 (1): 14–37.
Ortiz-Martínez VM, Andreo-Martinez P, Garcia-Martinez N, de los Ríos AP, Hernández-Fernández FJ, Quesada-Medina J. Approach to biodiesel production from microalgae under supercritical conditions by the PRISMA method. Fuel Process Technol. 2019; 191: 211-22.
Nosratabadi S, Mosavi A, Duan P, Ghamisi P, Filip F, Band SS, et al. Data science in economics: comprehensive review of advanced machine learning and deep learning methods. Mathematics. 2020; 8(10): 1799.
Amelia N, Abdullah AG, Mulyadi Y. Meta-analysis of student performance assessment using fuzzy logic. Indones J Sci Technol. 2019; 4(1): 74-88.
Gravetter FJ, Wallnau LB, Forzano L-AB, Witnauer JE. Essentials of statistics for the behavioral sciences: Cengage Learning; 2020.
Gao T, Deng X, Guo N, Wang X. An anonymous authentication scheme based on PMIPv6 for VANETs. IEEE Access. 2018 Feb 28; 6: 14686-98.
Anbar M, Abdullah R, Al-Tamimi BN, Hussain A. A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks. Cognit Comput. 2018; 10(2): 201-14.
Beck F, Chrisment I. A monitoring approach for safe IPv6 renumbering. Int Multiconf Comp Glob. Inf Technol. (ICCGI'06) 2006 Aug 1 : 1-6. IEEE.
Shah JL. A novel approach for securing IPv6 link local communication. Inf Secur J. 2016; 25(1-3): 136-50.
Wang Y, Tong S, Yang Y. A practical hybrid IP traceback method under IPv6. J Converg Inf Technol. 2012; 7: 173-82.
Li KH, Wong KY. Empirical analysis of IPv4 and IPv6 networks through dual-stack sites. Information. 2021 Jun 14; 12(6): 246.
Boukerche A, Zhang Q. Countermeasures against worm spreading: A new challenge for vehicular networks. ACM Comput. Surv. 2019 May 30; 52(2): 1-25.
Malik M, Dutta M. Implement ation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. IET Inf Secur. 2017; 12(1): 1-6.
Kao YC, Liu JC, Ke YQ, Tsai SC, Lin YB. Dual-stack network management through one-time authentication mechanism. IEEE Access. 2020 Feb 18; 8: 34706-16.
Dawadi BR, Rawat DB, Joshi SR. Software defined ipv6 network: A new paradigm for future networking. JIE. 2019 Jul 31; 15(2): 1-3.
El Khadiri K, Labouidya O, Elkamoun N, Hilal R. Performance evaluation of IPv4/IPv6 transition mechanisms for real-time applications using OPNET modeler. Int J Adv Comput Sci Appl. 2018; 9(4): 387-392.
Tian DJ, Butler KR, Choi JI, McDaniel P, Krishnaswamy P. Securing ARP/NDP from the ground up. EEE Trans Inf Forensics Secur. 2017; 12(9): 2131-43.
Singh R, Ranga V. Performance evaluation of machine learning classifiers on Internet of Things security dataset. Int J Control Autom. 2018 May; 11(5): 11-24.
Anbar M, Abdullah R, Al-Tamimi BN, Hussain A. A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks. Cognit Comput. 2018; 10(2): 201-14.
Kamaleshwar T, Lakshminarayanan R, Teekaraman Y, Kuppusamy R, Radhakrishnan A. Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN. Wirel. Commun Mob Comput. 2021; 2021: 1-8.
Verma A, Ranga V. Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel Pers Commun. 2019 Oct; 108(3): 1571-94.
Qiu Y, Ma M. Secure group mobility support for 6lowpan networks. IEEE Internet Things J. 2018; 5(2): 1131-41.
Qureshi KN, Rana SS, Ahmed A, Jeon G. A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc. 2020 Oct 1;61:102343.
Simoglou G, Violettas G, Petridou S, Mamatas L. Intrusion detection systems for RPL security: a comparative analysis. Comput Secur. 2021;104:102219.
Bang AO, Rao UP. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput. 2021 Dec;77(12):13703-38.
Pu C. Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 2020;7(6):4937-49.
Miguel ML, Jamhour E, Pellenz ME, Penna MC. SDN architecture for 6LoWPAN wireless sensor networks. Sensors. 2018 Nov 2; 18(11): 3738.
Yan Z, Zhou H, Wang H-C, Zhang H, Zhang S. Design and implementation of a hybrid MIPv6/PMIPv6-based mobility management architecture. Math Comput Model. 2011; 53(3-4): 421-42.
Shah JL, Bhat HF, Khan AI. CloudIoT: towards seamless and secure integration of cloud computing with Internet of Things. IJDCF. 2019 Jul 1; 11(3): 1-22.
Leiter Á, Bokor L. A flow-based and operator-centric dynamic mobility management scheme for proxy mobile IPv6. Wirel Commun Mob Comput. 2019; 2019: 1-21
Mathi S. An optimize d and secure BUTE–binding update using twofold encryption for next generation IP mobility. J Intell Fuzzy Syst. 2018; 34(3): 1311-22.
Tajdini M. Developing an Advanced IPv6 Evasion Attack Detection Framework. [PhD dissertation]. Liverpool John Moores University (UK); 2018. Available from:
https://researchonline.ljmu.ac.uk/9864/1/2018TajdiniPhD.pdf
Mathi S, Khatri A, Sethuraman M, Anbarasi P. A secure and optimized location update for next generation proxy mobility based internet protocol networks. J. Intell. Fuzzy Syst. 2019; 36(3): 2443-53.
Samir NM, Musni M, Hanapi ZM, Radzuan MR. Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks. Baghdad Sci J. 2021 Dec 20; 18(4): 1371-7
Modares H, Mora. A, Salleh RB, Lloret J. Enhancing security in mobile IPv6. ETRI J. 2014; 36(1): 51-61.
Mathi SE, Valarmathi M. An enhanced binding update scheme for next generation internet protocol mobility. J Eng Sci Technol. 2018 Mar 1; 13(3): 573-88.
Shawahna A, Abu-Amara M, Mahmoud AS, Osais Y. EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans Cloud Comput. 2018 Feb 14; 8(3): 790-804.
Al-Kaseem BR, Al-Dunainawi Y, Al-Raweshidy HS. End-to-end delay enhancement in 6LoWPAN testbed using programmable network concepts. IEEE Internet Things J. 2018 Nov 1; 6(2): 3070-86.
Tsetse A, Bonniord E, Appiah-Kubi P, Tweneboah-Kodua S. Performance Study of the Impact of Security on 802.11 ac Networks. Future Gener Comput Syst 2018 : 11-17. Cham, Switzerland: Springer; [cited 2022 July 1]. Available from: https://doi.org/10.1007/978-3-319-77028-4_3.
Yang W, Li C-d, Chang G-r, Yao Y, Shen X-m. The effect of P2P-based worm propagation in an IPv6. Procedia Eng. 2011; 15: 3637-41.
Taib AM, Othman NA, Hamid RS, Abd Halim IH. A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes. In 2019 21st International Conference on Advanced Communication Technology (ICACT) 2019 Feb 17: 419-424. IEEE.
Zou CC, Towsley D, Gong W, Cai S. Routing worm: A fast, selective attack worm based on ip address information. Workshop on Principles of Advanced and Distributed Simulation (PADS'05) 2005 Jun 1 (pp. 199-206). IEEE.
Goel JN, Mehtre BM. Dynamic IPv6 activation based defense for IPv6 router advertisement flooding (DoS) attack. In 2014 IEEE International Conference on Computational Intelligence and Computing Research 2014 Dec 18 (pp. 1-5). IEEE.
Polčák L, Holkovič M, Matoušek P. A new approach for detection of host identity in IPv6 networks. In2013 International Conference on Data Communication Networking (DCNET) 2013 Jul 29 (pp. 1-7). IEEE.
Li C, Wu Q, Li H, Zhou J. SDN-Ti: a general solution based on SDN to attacker traceback and identification in IPv6 networks. In ICC 2019-2019 IEEE International Conference on Communications (ICC) 2019 May 20 (pp. 1-7). IEEE.
Lu Y, Wang M, Huang P. An SDN-based authentication mechanism for securing neighbor discovery protocol in IPv6. Secur Commun Netw. 2017 Jan 1;2017.
Mehdizadeh A, Abdullah RS, Hashim F. Secure group communication scheme in wireless IPv6 networks: An experimental test-bed. In 2012 International Symposium on Communications and Information Technologies (ISCIT) 2012 Oct 2 (pp. 724-729). IEEE.
Shih CM, Kao SJ. Security Gateway for Accessing IPv6 WLAN. In 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR'06) 2006 Jul 10 (pp. 83-88). IEEE.
Misra S, Goswami S, Taneja C, Mukherjee A, Obaidat MS. A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs. IEEE Access. 2015; 3: 875-89.
Oliveira LML, Rodrigues JJ, de Sousa AF, Denisov VM. Network admission control solution for 6LoWPAN networks based on symmetric key mechanisms. IEEE Trans Industr Inform. 2016; 12(6): 2186-95.
Wang X, Mu Y. A secure mobility support scheme for 6LoWPAN wireless sensor networks. Secur Commun Netw. 2014; 7(3): 641-52.
Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int. J Distrib Sens Netw. 2013 Aug 22;9(8):794326.
Abdulla S. A neuro-fuzzy system to detect IPv6 router alert option DoS packets. Int Arab J Inf Technol. 2020; 17(1): 16-25.
Shiranzaei, A., Khan, R.Z. IPv6 Security Issues—A Systematic Review. In: Lobiyal D, Mansotra V, Singh U, editors. Adv Intell Syst Comput. Springer; 2017. p. 41–49.
Sajjad MM, Jayalath D, Bernardos CJ. A comprehensive review of enhancements and prospects of fast handovers for mobile IPv6 protocol. IEEE Access. 2018; 7: 4948-78.
Labs A. IPv6 Capable Rate by country (%) 2020 [Available from: https://stats.labs.apnic.net/ipv6.
Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput Secur. 2018; 77: 397-411.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Baghdad Science Journal
This work is licensed under a Creative Commons Attribution 4.0 International License.