Results 31 to 40 of about 14,618 (242)
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy+5 more
doaj +1 more source
Impact of IPv4-IPv6 Coexistence in Cloud Virtualization Environment [PDF]
Since January 2011, IPv4 address space has exhausted and IPv6 is taking up the place as successor. Coexistence of IPv4 and IPv6 bears problem of incompatibility, as IPv6 and IPv4 headers are different from each other, thus, cannot interoperate with each other directly.
arxiv +1 more source
Context Aware Handover Algorithms For Mobile Positioning Systems
: This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery.
Sazid Z. Khan+4 more
doaj +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan+4 more
doaj +1 more source
IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation [PDF]
The objective of this paper is to analyze and characterize to simulate routing observations on end-to-end routing circuits and a ping experiment of a virtual network after modeling, such as IPv6 migration, an OSPFv3 routing experiment based on an IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 ...
openaire +2 more sources
On Implementing IPTV Platform with IPv4 and IPv6 Devices
The end of IPv4 addresses is now a reality. Providers not updated to IPv6 will have to hurry up the IPv6 start in its own network. Introduction of IPv6 means not only change of main routers but also change of mentality in operators, applications ...
Jordi Mongay Batalla, Piotr Krawiec
doaj +1 more source
Current State of IPv6 Security in IoT [PDF]
This report presents the current state of security in IPv6 for IoT devices. In this research conducted from May 2020 to July 2020, we explored the global growth of IPv6 and compared it with the real growth of IPv6 in a medium size network. If IPv6 is already being used, are attackers already attacking using this protocol?
arxiv
How Ready Is DNS for an IPv6-Only World? [PDF]
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAAA resource record for a zone's nameserver does not necessarily imply that it is resolvable in an IPv6-only ...
arxiv