Free Academic Seminars And Projects Reports

Full Version: An IPv4–to-IPv6 Threat reviews with Dual Stack Transition Mechanism
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
An IPv4 to-IPv6 Threat reviews with Dual Stack Transition Mechanism Considerations a Transitional threat model in 4G Wireless networks

Though the IPv6 offers a large number of advantages over the current IPv4, it will take a long time to replace IPv4 with IPv6. The network administrator must become aware of the IPv6 protocol and the associated risks in terms of the security of the network. The transition mechanism called the Dual Stack plays an important role in the IPv6 and 4G networks. The network is made susceptible to many attacks due to the presence of the IPv6 and this is the major issue of Dual Stack transition mechanism. the network security infrastructure can be easily bypassed by an adversary if the transition to IPv6 is done without taking adequate precautions. But the transition is imminent. In this article, a transitional threat model is proposed to solve all IPv6 threat issues for dual stack transition in 4G. The common attacks in IPv6 in 4G networks are briefly outlined in the article and also how the new transition model can tackle this threat is described.

Get the report here
http://scribddoc/26145568/Cscit-Paper-2