{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:58Z","timestamp":1767339298617,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067938"},{"type":"electronic","value":"9783031067945"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06794-5_47","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"583-598","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey on IPv6 Security Threats and Defense Mechanisms"],"prefix":"10.1007","author":[{"given":"Ning","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bingnan","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Zhilin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet protocol, version 6 (ipv6) specification. RFC 1883 (Proposed Standard) (1995)","DOI":"10.17487\/rfc1883"},{"key":"47_CR2","unstructured":"Aura, T.: Neighbor discovery for IP version 6 (ipv6). RFC2461, Internet Engineering Task Force (1998)"},{"key":"47_CR3","unstructured":"APNIC. Measuring IPv6 (2020). https:\/\/labs.apnic.net\/?p=1335"},{"key":"47_CR4","first-page":"36","volume":"42","author":"E Carlos","year":"2009","unstructured":"Carlos, E., Caicedo, J., Joshi, B.D.: IPv6 security challenges. Computer 42, 36\u201342 (2009)","journal-title":"Computer"},{"key":"47_CR5","unstructured":"Hosnieh, R., Christoph, M.: Privacy and security in ipv6 networks: challenges and possible solutions. In: SIN (2013)"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Praptodiyono, S., et al.: Mobile IPv6 vertical handover specifications, threats, and mitigation methods: a survey. Secur. Commun. Netw. 2020, 5429630 (2020)","DOI":"10.1155\/2020\/5429630"},{"key":"47_CR7","unstructured":"Praptodiyono, S., et al.: Improving the security of mobile IPV6 signalling using KECCAK\/SHA-3. J. Eng. Sci. Technol. 16(3), 2312\u20132325 (2021)"},{"key":"47_CR8","unstructured":"Ubiedo, L., et al.: Current State of IPv6 Security in IoT. arXiv:2105.02710 (2021)"},{"key":"47_CR9","doi-asserted-by":"publisher","first-page":"90294","DOI":"10.1109\/ACCESS.2020.2993700","volume":"8","author":"R Liu","year":"2020","unstructured":"Liu, R., et al.: Addressless: enhancing IoT server security using IPv6. IEEE Access 8, 90294\u201390315 (2020)","journal-title":"IEEE Access"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Li, X.: Fast IPv6 network periphery discovery and security implications. In: 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2021)","DOI":"10.1109\/DSN48987.2021.00025"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Al-Azzawi, A., Lencse, G.: Towards the identification of the possible security issues of the 464xlat ipv6 transition technology. In: 2020 43rd International Conference on Telecommunications and Signal Processing (2020)","DOI":"10.1109\/TSP49548.2020.9163487"},{"key":"47_CR12","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Security features in IPv6. Whitepaper, SANS Institute (2002)"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Narten, W.A.S.T., Nordmark, E., Soliman, H.: Neighbor discovery for IP version 6 (IPv6). RFC 4861 (2007)","DOI":"10.17487\/rfc4861"},{"issue":"9","key":"47_CR14","first-page":"4","volume":"3","author":"P Tayal","year":"2014","unstructured":"Tayal, P.: IPV6 SLAAC related security issues and removal of those security issues. Int. J. Eng. Comput. Sci. 3(9), 4 (2014)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"47_CR15","unstructured":"Ferdous, A.B., Santosh, B., Sukumar, N.: Detection of neighbor solicitation and advertisement spoofing in ipv6 neighbor discovery protocol. In: SIN (2011)"},{"issue":"2","key":"47_CR16","first-page":"63","volume":"8","author":"SU Rehman","year":"2017","unstructured":"Rehman, S.U., Manickam, S.: Improved mechanism to prevent denial of service attack in IPv6 duplicate address detection process. Int. J. Adv. Comput. Sci. Appl 8(2), 63\u201370 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Trabelsi, Z., Shuaib, K.: Man in the middle intrusion detection. In: Globecom, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.282"},{"key":"47_CR18","doi-asserted-by":"crossref","unstructured":"Barbhuiya, F.A., Biswas, S., Nandi, S.: Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. In: Proceedings of the 4th International Conference on Security of Information and Networks, SIN, pp. 111\u2013118 (2011)","DOI":"10.1145\/2070425.2070444"},{"issue":"9","key":"47_CR19","doi-asserted-by":"publisher","first-page":"440","DOI":"10.3390\/info11090440","volume":"11","author":"K Wang","year":"2020","unstructured":"Wang, K.: A web-based honeypot in IPv6 to enhance security. Information 11(9), 440 (2020)","journal-title":"Information"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Audet, F., Jennings, C.: Network address translation (NAT) behavioral requirements for unicast UDP. IETF (2007)","DOI":"10.17487\/rfc4787"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Yang, T., Cai, Z., Zhou, T.: 6Forest: an ensemble learning-based approach to target generation for internet-wide IPv6 scanning. In: Proceedings of INFOCOM (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796925"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Hou, B.: 6Hit: a reinforcement learning-based approach to target generation for internet- wide IPv6 scanning. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"47_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108666","author":"T Yang","year":"2021","unstructured":"Yang, T., Hou, B., Cai, Z., Wu, K., Zhou, T., Wang, C.: 6Graph: a graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Comput. Netw. (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108666","journal-title":"Comput. Netw."},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: Dynamic host configuration protocol for IPv6 (DHCPv6). IETF (2003)","DOI":"10.17487\/rfc3315"},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Abad, C.L., Bonilla, R.I.: An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: International Conference on Distributed Computing Systems Workshops, pp. 60\u201367 (2007)","DOI":"10.1109\/ICDCSW.2007.19"},{"key":"47_CR26","unstructured":"Arkko, E.J., Kempf, J., Zill, B., Nikander, P.: Secure neighbor discovery (SEND). RFC 3971, Internet Engineering Task Force (2005)"},{"key":"47_CR27","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet Protocol, version 6 (IPv6) specification. IETF (1998)","DOI":"10.17487\/rfc2460"},{"key":"47_CR28","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP authentication header. RFC 4302 (2005)","DOI":"10.17487\/rfc4302"},{"key":"47_CR29","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP encapsulating security payload (ESP). RFC 4303 (2005)","DOI":"10.17487\/rfc4303"},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet key exchange protocol version 2 (ikev2). RFC5996 (2010)","DOI":"10.17487\/rfc5996"},{"key":"47_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/11542322_29","volume-title":"Security Protocols","author":"J Arkko","year":"2005","unstructured":"Arkko, J., Nikander, P.: Limitations of IPSec policy mechanisms. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 241\u2013251. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11542322_29"},{"key":"47_CR32","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R., Krishnan, S.: Privacy extensions for stateless address autoconfiguration in IPv6. IETF (2007)","DOI":"10.17487\/rfc4941"},{"key":"47_CR33","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically generated addresses (CGA). RFC3972 (2005)","DOI":"10.17487\/rfc3972"},{"key":"47_CR34","unstructured":"Hosnieh, R., Christoph, M.: Privacy and security in IPv6 networks: challenges and possible solutions. In: SIN (2011)"},{"key":"47_CR35","unstructured":"Praptodiyono, S., Hasbullah, I.H., Kadhum, M.M., Wey, C.Y., Murugesan, R.K., Osman, A.: Securing duplicate address detection on IPv6 using distributed trust mechanism. Int. J. Simul. Syst. Sci. Technol. 17(26) (2016)"},{"issue":"2-3","key":"47_CR36","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s10623-015-0096-0","volume":"77","author":"E Andreeva","year":"2015","unstructured":"Andreeva, E., Mennink, B., Preneel, B.: Open problems in hash function security. Des. Codes Crypt. 77(2\u20133), 611\u2013631 (2015). https:\/\/doi.org\/10.1007\/s10623-015-0096-0","journal-title":"Des. Codes Crypt."},{"key":"47_CR37","doi-asserted-by":"crossref","unstructured":"Polk, T., Chen, L., Turner, S., Hoffman, P.: Security considerations for the sha-0 and sha-1 message-digest algorithms (2011)","DOI":"10.17487\/rfc6194"},{"issue":"3","key":"47_CR38","first-page":"151612","volume":"11","author":"G Song","year":"2016","unstructured":"Song, G., Ji, Z.: Novel duplicate address detection with hash function. PLoS ONE 11(3), 151612 (2016)","journal-title":"PLoS ONE"},{"key":"47_CR39","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm (1992)","DOI":"10.17487\/rfc1321"},{"issue":"1","key":"47_CR40","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/JPROC.2009.2034031","volume":"98","author":"K Butler","year":"2010","unstructured":"Butler, K., Farley, T.R., Mcdaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100\u2013122 (2010)","journal-title":"Proc. IEEE"},{"key":"47_CR41","doi-asserted-by":"crossref","unstructured":"Al-Ani, A.K., Anbar, M., Manickam, S., Al-Ani, A., Leau, Y.B.: Proposed dad-match security technique based on Hash Function to secure duplicate address detection in IPv6 Link-local Network. In: ICIT (2017)","DOI":"10.1145\/3176653.3176707"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06794-5_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:17:20Z","timestamp":1657714640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06794-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067938","9783031067945"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06794-5_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Adaptive and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icais2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}