{"title":"IPv6分布式安全:问题陈述","authors":"A. Vives, J. Palet","doi":"10.1109/SAINTW.2005.72","DOIUrl":null,"url":null,"abstract":"The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availability of IPsec in all IPv6 stacks, the increase in the number and type of IP devices and also the increase in the number of nomadic devices. The security policies and architectures currently applied in Internet with IPv4, do not longer apply for end-to-end security models which IPv6 needs. We will outline the advantages and drawbacks of both security schemes: network-based and distributed and will try to identify IPv6 issues that justify the need of a distributed security model for IPv6.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"IPv6 Distributed Security: Problem Statement\",\"authors\":\"A. Vives, J. Palet\",\"doi\":\"10.1109/SAINTW.2005.72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availability of IPsec in all IPv6 stacks, the increase in the number and type of IP devices and also the increase in the number of nomadic devices. The security policies and architectures currently applied in Internet with IPv4, do not longer apply for end-to-end security models which IPv6 needs. We will outline the advantages and drawbacks of both security schemes: network-based and distributed and will try to identify IPv6 issues that justify the need of a distributed security model for IPv6.\",\"PeriodicalId\":220913,\"journal\":{\"name\":\"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAINTW.2005.72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAINTW.2005.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availability of IPsec in all IPv6 stacks, the increase in the number and type of IP devices and also the increase in the number of nomadic devices. The security policies and architectures currently applied in Internet with IPv4, do not longer apply for end-to-end security models which IPv6 needs. We will outline the advantages and drawbacks of both security schemes: network-based and distributed and will try to identify IPv6 issues that justify the need of a distributed security model for IPv6.