Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
11
Page No.
3674 - 3678
References
Caicedo, C.E., J.B.D. Joshi and S.R. Tuladhar, 2009. IPv6 security challenges. Comput., 42: 36-42.
CrossRef | Direct Link | Davies, E., S. Krishnan and P. Savola, 2007. IPv6 transition/co-existence security considerations. Internet Engineering Task Force, Fremont, California, USA. http://www.rfc-editor.org/info/rfc4942
Deering, S. and R. Hinden, 1998. Internet protocol version 6 (Ipv6) specification. Internet Protoc., Vol. 6, 10.17487/RFC2460
Durdagi, E. and A. Buldu, 2010. IPV4/IPV6 security and threat comparisons. Procedia-Social Behav. Sci., 2: 5285-5291.
CrossRef | Direct Link | Hagen, S., 2004. IPv6 Essentials. 3rd Edn., O’Reilly Media, Inc., Sebastopol, California, USA., ISBN:978-1-4493-1921-2, Pages: 391.
Lim, J. and Y. Kim, 2006. Protection algorithm against security holes of IPv6 routing header. Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT 2006), February 20-22, 2006, IEEE, Phoenix Park, South Korea, pp: 2004-2007.
Shenify, M., 2014. Trusted node-based algorithm to secure home agent nated IPv4 network from IPv6 routing header attacks. TELKOMNIKA. Telecommunication Comput. Electron. Control, 12: 969-976.
CrossRef | Wadhwa, M. and M. Khari, 2001. Prevention algorithm against the vulnerability of type 0 routing header in Ipv6. Proceedings of the 2011 International Conference on Computational Intelligence and Communication Networks, October 7-9, 2011, IEEE, Gwalior, India, ISBN:978-1-4577-2033-8, pp: 616-620.