The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses, along with the implications each method may have upon privacy in different usage scenarios. The division of address space amongst the global registries in a hierarchal fashion can provide geographical information about the location of an address, and its originating device. Many IPv6 address configuration methods are available, including DHCPv6, SLAAC (with or without privacy extensions), and Manual assignment. These assignment techniques are dissected to expose the identifying characteristics of each technique. It is seen that use of the modified EUI-64 in SLAAC can ...
The paper presents results of collision probability evaluation of a one-to-many reversible mapping ...
This paper is focused on privacy issues related to the prefix part of IPv6 addresses. Long-lived pre...
This paper presents the development of a one-to-many reversible mapping mechanism simulation for IPv...
Abstract—Current implementations of the Internet Protocol version 6 (IPv6) use stateless address aut...
This paper discusses the implementation of IPv6 address generation/assignment mechanism proposed in ...
Network stacks on most operating systems are configured by default to use the interface MAC address ...
Despite the adoption of security extensions in IPv6 addressing, usage of EUI-64'based addresses are ...
Part 6: Security ConceptsInternational audiencePrivacy is a major concern on the current Internet, b...
International audiencePrivacy is a major concern on the current Internet, but transport mechanisms l...
Part 5: Various Aspects of Computer SecurityInternational audienceIPv6 is a new version of IP protoc...
The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 w...
AbstractThe Neighbor Discovery Protocol (NDP) is the predominant component in IPv6; the next generat...
IPv6 Privacy extensions, implemented in major operating systems, hide user’s identity by using a tem...
Abstract In this deliberately preposterous paper, we show that the inclusion of the source IP addres...
Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as...
The paper presents results of collision probability evaluation of a one-to-many reversible mapping ...
This paper is focused on privacy issues related to the prefix part of IPv6 addresses. Long-lived pre...
This paper presents the development of a one-to-many reversible mapping mechanism simulation for IPv...
Abstract—Current implementations of the Internet Protocol version 6 (IPv6) use stateless address aut...
This paper discusses the implementation of IPv6 address generation/assignment mechanism proposed in ...
Network stacks on most operating systems are configured by default to use the interface MAC address ...
Despite the adoption of security extensions in IPv6 addressing, usage of EUI-64'based addresses are ...
Part 6: Security ConceptsInternational audiencePrivacy is a major concern on the current Internet, b...
International audiencePrivacy is a major concern on the current Internet, but transport mechanisms l...
Part 5: Various Aspects of Computer SecurityInternational audienceIPv6 is a new version of IP protoc...
The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 w...
AbstractThe Neighbor Discovery Protocol (NDP) is the predominant component in IPv6; the next generat...
IPv6 Privacy extensions, implemented in major operating systems, hide user’s identity by using a tem...
Abstract In this deliberately preposterous paper, we show that the inclusion of the source IP addres...
Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as...
The paper presents results of collision probability evaluation of a one-to-many reversible mapping ...
This paper is focused on privacy issues related to the prefix part of IPv6 addresses. Long-lived pre...
This paper presents the development of a one-to-many reversible mapping mechanism simulation for IPv...