المشاكل الأمنية في IPv6: مراجعة منهجية وفقًا لإرشادات PRISMA

المؤلفون

DOI:

https://doi.org/10.21123/bsj.2022.7312

الكلمات المفتاحية:

IPv6 ، نشر IPv6 ، أمان IPv6 ، إرشادات PRISMA ، المراجعة المنهجية

الملخص

بما أن الإصدار 6 من بروتوكول الإنترنت (IPv6) عبارة عن تقنية جديدة ، فإن الثغرات الأمنية التي تنشأ خلال إعدادات شبكات الحاسوب هو أمر حتمي بسبب قلة المعرفة بهذه التقنية الجديدة ، ساهم الباحثون عبر العالم كثيرًا في نشر المعرفة حول الثغرات الأمنية في IPv6 وكيفية معالجتها على مدار العقدين الماضيين ، وفي هذه الدراسة ، يتم إجراء مراجعة منهجية للأدبيات لتحليل تقدم البحث في مجال أمان IPv6 باتباع عناصر التقارير المفضلة لطريقة المراجعة المنهجية والتحليل المسماة (PRISMA) ، تمت في هذه الورقة البحثية مراجعة ما مجموعه 427 دراسة من قاعدتي بيانات IEEE و Scopus ، و لتحقيق هدف الورقة البحثية ، فقد تم استخلاص العديد من عناصر البيانات الرئيسية من كل دراسة وتم إجراء نوعين من التحليل: التحليل الوصفي وتصنيف الأدبيات ، تُظهر نتائج البحث علامات إيجابية للمساهمات البحثية في هذا المجال ، ويمكن اعتباره هذه الورقة البحثية كمرجع لاستكشاف البحث في العقدين الماضيين في مجال أمان IPv6 ورسم الاتجاهات المستقبلية للبحوث في هذا المجال ، على سبيل المثال ، زادت نسبة النشر من 147 في العقد من 2000-2010 إلى 330 في العقد من 2011 إلى 2020 مما يعني أن النسبة المئوية للزيادة كانت 124٪. عدد الاستشهادات هو نتيجة رئيسية أخرى تعكس الاهتمام العالمي الكبير بالبحوث المخصصة لقضايا أمان IPv6 ، حيث كان 409 استشهاداً في العقد من 2000-2010 ، ثم ارتفع إلى 1643 استشهاداً خلال العقد من 2011 إلى 2020 ، أي أن نسبة الزيادة كانت 302٪.

المراجع

Cui Y, Wu P, Xu M, Wu J, Lee YL, Durand A, et al. 4over6: network layer virtualization for IPv4-IPv6 coexistence. IEEE Network. 2012; 26(5): 44-8.

Javaid N, Sher A, Nasir H, Guizani N. Intelligence in IoT-based 5G networks: Opportunities and challenges. IEEE Commun. Mag. 2018; 56(10): 94-100.

Abdulzahra SA, Al-Qurabat AK, Idrees AK. “Compression-based Data Reduction Technique for IoT Sensor Networks”, Baghdad Sci J. 2021; 18(1): 1840198

Davies J. Understanding IPv6: Understanding IPv6 _p3: Pearson Education; 2012. Available from: https://www.amazon.com/Understanding-IPv6-_p3-ebook/dp/B00JDMPHT0

Google.com. IPv6 Capable Rate by country [Internet]. 2022 [update 2022 July 1; cited 2022 July 1]. Available from: https://stats.labs.apnic.net/ipv6.

Lencse G, Kadobayashi Y. Comprehensive survey of IPv6 transition technologies: A subjective classification for security analysis. IEICE Trans Commun. 2019; 102(10): 2021-35.

Khan AA, Ali SA. Network forensics investigation: Behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. Int J Electron Secur Digit Forensics. 2021;1 3(6): 600-11.

Abdulla SA. Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms. Int J Netw Secur. 2017; 12(2): 83-102.

Al-Ani AK, Anbar M, Manickam S, Wey CY, Leau Y-B, Al-Ani A. Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements. Arab J Sci Eng. 2019; 44(4): 3745-63.

Anbar M, Abdullah R, Saad R, Alomari E, Alsaleem S. Review of security vulnerabilities in the IPv6 neighbor discovery protocol. Inform Sci-Appl.(ICISA). 2016 : 603-612. Springer, Singapore.

Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N. Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc. 2021 Feb 19; 23(sup1): S47-59.

Dawadi BR, Rawat DB, Joshi SR, Manzoni P, Keitsch MM. Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network. Int J Netw Manag. 2020: e2145.

Moher D, Liberati A, Tetzlaff J, Altman DG. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Int J Surg. 2010; 8(5): 336-41.

Supriyanto, Hasbullah IH, Murugesan RK, Ramadass S. Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods. IETE Tech Rev. 2013; 30(1): 64-71.

Modares H, Moravejosharieh A, Lloret J, Salleh R. A survey of secure protocols in mobile IPv6. J Netw Comput Appl. 2014; 39: 351-68.

Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput Secur. 2018 Aug 1; 77: 397-411.

Allely CS. Understanding and recognising the female phenotype of autism spectrum disorder and the ‘camouflage’hypothesis: A systematic PRISMA review. Adv Autism. 2019; 5 (1): 14–37.

Ortiz-Martínez VM, Andreo-Martinez P, Garcia-Martinez N, de los Ríos AP, Hernández-Fernández FJ, Quesada-Medina J. Approach to biodiesel production from microalgae under supercritical conditions by the PRISMA method. Fuel Process Technol. 2019; 191: 211-22.

Nosratabadi S, Mosavi A, Duan P, Ghamisi P, Filip F, Band SS, et al. Data science in economics: comprehensive review of advanced machine learning and deep learning methods. Mathematics. 2020; 8(10): 1799.

Amelia N, Abdullah AG, Mulyadi Y. Meta-analysis of student performance assessment using fuzzy logic. Indones J Sci Technol. 2019; 4(1): 74-88.

Gravetter FJ, Wallnau LB, Forzano L-AB, Witnauer JE. Essentials of statistics for the behavioral sciences: Cengage Learning; 2020.

Gao T, Deng X, Guo N, Wang X. An anonymous authentication scheme based on PMIPv6 for VANETs. IEEE Access. 2018 Feb 28; 6: 14686-98.

Anbar M, Abdullah R, Al-Tamimi BN, Hussain A. A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks. Cognit Comput. 2018; 10(2): 201-14.

Beck F, Chrisment I. A monitoring approach for safe IPv6 renumbering. Int Multiconf Comp Glob. Inf Technol. (ICCGI'06) 2006 Aug 1 : 1-6. IEEE.

Shah JL. A novel approach for securing IPv6 link local communication. Inf Secur J. 2016; 25(1-3): 136-50.

Wang Y, Tong S, Yang Y. A practical hybrid IP traceback method under IPv6. J Converg Inf Technol. 2012; 7: 173-82.

Li KH, Wong KY. Empirical analysis of IPv4 and IPv6 networks through dual-stack sites. Information. 2021 Jun 14; 12(6): 246.

Boukerche A, Zhang Q. Countermeasures against worm spreading: A new challenge for vehicular networks. ACM Comput. Surv. 2019 May 30; 52(2): 1-25.

Malik M, Dutta M. Implement ation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. IET Inf Secur. 2017; 12(1): 1-6.

Kao YC, Liu JC, Ke YQ, Tsai SC, Lin YB. Dual-stack network management through one-time authentication mechanism. IEEE Access. 2020 Feb 18; 8: 34706-16.

Dawadi BR, Rawat DB, Joshi SR. Software defined ipv6 network: A new paradigm for future networking. JIE. 2019 Jul 31; 15(2): 1-3.

El Khadiri K, Labouidya O, Elkamoun N, Hilal R. Performance evaluation of IPv4/IPv6 transition mechanisms for real-time applications using OPNET modeler. Int J Adv Comput Sci Appl. 2018; 9(4): 387-392.

Tian DJ, Butler KR, Choi JI, McDaniel P, Krishnaswamy P. Securing ARP/NDP from the ground up. EEE Trans Inf Forensics Secur. 2017; 12(9): 2131-43.

Singh R, Ranga V. Performance evaluation of machine learning classifiers on Internet of Things security dataset. Int J Control Autom. 2018 May; 11(5): 11-24.

Anbar M, Abdullah R, Al-Tamimi BN, Hussain A. A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks. Cognit Comput. 2018; 10(2): 201-14.

Kamaleshwar T, Lakshminarayanan R, Teekaraman Y, Kuppusamy R, Radhakrishnan A. Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN. Wirel. Commun Mob Comput. 2021; 2021: 1-8.

Verma A, Ranga V. Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel Pers Commun. 2019 Oct; 108(3): 1571-94.

Qiu Y, Ma M. Secure group mobility support for 6lowpan networks. IEEE Internet Things J. 2018; 5(2): 1131-41.

Qureshi KN, Rana SS, Ahmed A, Jeon G. A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc. 2020 Oct 1;61:102343.

Simoglou G, Violettas G, Petridou S, Mamatas L. Intrusion detection systems for RPL security: a comparative analysis. Comput Secur. 2021;104:102219.

Bang AO, Rao UP. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput. 2021 Dec;77(12):13703-38.

Pu C. Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 2020;7(6):4937-49.

Miguel ML, Jamhour E, Pellenz ME, Penna MC. SDN architecture for 6LoWPAN wireless sensor networks. Sensors. 2018 Nov 2; 18(11): 3738.

Yan Z, Zhou H, Wang H-C, Zhang H, Zhang S. Design and implementation of a hybrid MIPv6/PMIPv6-based mobility management architecture. Math Comput Model. 2011; 53(3-4): 421-42.

Shah JL, Bhat HF, Khan AI. CloudIoT: towards seamless and secure integration of cloud computing with Internet of Things. IJDCF. 2019 Jul 1; 11(3): 1-22.

Leiter Á, Bokor L. A flow-based and operator-centric dynamic mobility management scheme for proxy mobile IPv6. Wirel Commun Mob Comput. 2019; 2019: 1-21

Mathi S. An optimize d and secure BUTE–binding update using twofold encryption for next generation IP mobility. J Intell Fuzzy Syst. 2018; 34(3): 1311-22.

Tajdini M. Developing an Advanced IPv6 Evasion Attack Detection Framework. [PhD dissertation]. Liverpool John Moores University (UK); 2018. Available from:

https://researchonline.ljmu.ac.uk/9864/1/2018TajdiniPhD.pdf

Mathi S, Khatri A, Sethuraman M, Anbarasi P. A secure and optimized location update for next generation proxy mobility based internet protocol networks. J. Intell. Fuzzy Syst. 2019; 36(3): 2443-53.

Samir NM, Musni M, Hanapi ZM, Radzuan MR. Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks. Baghdad Sci J. 2021 Dec 20; 18(4): 1371-7

Modares H, Mora. A, Salleh RB, Lloret J. Enhancing security in mobile IPv6. ETRI J. 2014; 36(1): 51-61.

Mathi SE, Valarmathi M. An enhanced binding update scheme for next generation internet protocol mobility. J Eng Sci Technol. 2018 Mar 1; 13(3): 573-88.

Shawahna A, Abu-Amara M, Mahmoud AS, Osais Y. EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans Cloud Comput. 2018 Feb 14; 8(3): 790-804.

Al-Kaseem BR, Al-Dunainawi Y, Al-Raweshidy HS. End-to-end delay enhancement in 6LoWPAN testbed using programmable network concepts. IEEE Internet Things J. 2018 Nov 1; 6(2): 3070-86.

Tsetse A, Bonniord E, Appiah-Kubi P, Tweneboah-Kodua S. Performance Study of the Impact of Security on 802.11 ac Networks. Future Gener Comput Syst 2018 : 11-17. Cham, Switzerland: Springer; [cited 2022 July 1]. Available from: https://doi.org/10.1007/978-3-319-77028-4_3.

Yang W, Li C-d, Chang G-r, Yao Y, Shen X-m. The effect of P2P-based worm propagation in an IPv6. Procedia Eng. 2011; 15: 3637-41.

Taib AM, Othman NA, Hamid RS, Abd Halim IH. A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes. In 2019 21st International Conference on Advanced Communication Technology (ICACT) 2019 Feb 17: 419-424. IEEE.

Zou CC, Towsley D, Gong W, Cai S. Routing worm: A fast, selective attack worm based on ip address information. Workshop on Principles of Advanced and Distributed Simulation (PADS'05) 2005 Jun 1 (pp. 199-206). IEEE.

Goel JN, Mehtre BM. Dynamic IPv6 activation based defense for IPv6 router advertisement flooding (DoS) attack. In 2014 IEEE International Conference on Computational Intelligence and Computing Research 2014 Dec 18 (pp. 1-5). IEEE.

Polčák L, Holkovič M, Matoušek P. A new approach for detection of host identity in IPv6 networks. In2013 International Conference on Data Communication Networking (DCNET) 2013 Jul 29 (pp. 1-7). IEEE.

Li C, Wu Q, Li H, Zhou J. SDN-Ti: a general solution based on SDN to attacker traceback and identification in IPv6 networks. In ICC 2019-2019 IEEE International Conference on Communications (ICC) 2019 May 20 (pp. 1-7). IEEE.

Lu Y, Wang M, Huang P. An SDN-based authentication mechanism for securing neighbor discovery protocol in IPv6. Secur Commun Netw. 2017 Jan 1;2017.

Mehdizadeh A, Abdullah RS, Hashim F. Secure group communication scheme in wireless IPv6 networks: An experimental test-bed. In 2012 International Symposium on Communications and Information Technologies (ISCIT) 2012 Oct 2 (pp. 724-729). IEEE.

Shih CM, Kao SJ. Security Gateway for Accessing IPv6 WLAN. In 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR'06) 2006 Jul 10 (pp. 83-88). IEEE.

Misra S, Goswami S, Taneja C, Mukherjee A, Obaidat MS. A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs. IEEE Access. 2015; 3: 875-89.

Oliveira LML, Rodrigues JJ, de Sousa AF, Denisov VM. Network admission control solution for 6LoWPAN networks based on symmetric key mechanisms. IEEE Trans Industr Inform. 2016; 12(6): 2186-95.

Wang X, Mu Y. A secure mobility support scheme for 6LoWPAN wireless sensor networks. Secur Commun Netw. 2014; 7(3): 641-52.

Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int. J Distrib Sens Netw. 2013 Aug 22;9(8):794326.

Abdulla S. A neuro-fuzzy system to detect IPv6 router alert option DoS packets. Int Arab J Inf Technol. 2020; 17(1): 16-25.

Shiranzaei, A., Khan, R.Z. IPv6 Security Issues—A Systematic Review. In: Lobiyal D, Mansotra V, Singh U, editors. Adv Intell Syst Comput. Springer; 2017. p. 41–49.

Sajjad MM, Jayalath D, Bernardos CJ. A comprehensive review of enhancements and prospects of fast handovers for mobile IPv6 protocol. IEEE Access. 2018; 7: 4948-78.

Labs A. IPv6 Capable Rate by country (%) 2020 [Available from: https://stats.labs.apnic.net/ipv6.

Lencse G, Kadobayashi Y. Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. Comput Secur. 2018; 77: 397-411.

التنزيلات

منشور

2022-12-05

كيفية الاقتباس

1.
المشاكل الأمنية في IPv6: مراجعة منهجية وفقًا لإرشادات PRISMA. Baghdad Sci.J [انترنت]. 5 ديسمبر، 2022 [وثق 12 مايو، 2024];19(6(Suppl.):1430. موجود في: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7312

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.