6. Conclusions and outlook
The first part of the paper presented the possibilities available to operators for integrating IPv6 into mobile architectures, in two main ways, one consisting in allocating only an IPv6 prefix to the client, and the second in allocating an IPv6 prefix in addition to the IPv4 address. The second part of the document describes a number of security issues specific to mobile networks on the one hand, and to the IPv6 protocol on the other, as well as some ways of dealing with them.
This article is by no means exhaustive, and readers may wish to refer in particular to the articles published by Techniques de l'Ingénieur –
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusions and outlook
Bibliography
Websites
• World IPv6 launch – measurements http://www.worldipv6launch.org
• Arbor Special Report – Worldwide Infrastructure Security Report https://www.netscout.com/arbor-ddos
• Secure Works – Assess your risk from an advanced persistent...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference