{"id":"https://openalex.org/W2232180256","doi":"https://doi.org/10.1007/978-3-319-20034-7_16","title":"Characterizing the IPv6 Security Landscape by\u00a0Large-Scale Measurements","display_name":"Characterizing the IPv6 Security Landscape by\u00a0Large-Scale Measurements","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2232180256","doi":"https://doi.org/10.1007/978-3-319-20034-7_16","mag":"2232180256"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20034-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-20034-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-20034-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-20034-7_16.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068144761","display_name":"Luuk Hendriks","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Luuk Hendriks","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025537461","display_name":"Anna Sperotto","orcid":"https://orcid.org/0000-0002-9481-5846"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Anna Sperotto","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068144761"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":5.0926,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94728626,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"149"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8444137573242188},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.8184603452682495},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.5843003392219543},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5634534955024719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5553572773933411},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42886000871658325},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4141732454299927},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3394336402416229},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13180693984031677},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07928970456123352},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0658411979675293}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8444137573242188},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.8184603452682495},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.5843003392219543},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5634534955024719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5553572773933411},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42886000871658325},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4141732454299927},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3394336402416229},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13180693984031677},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07928970456123352},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0658411979675293},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-20034-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-20034-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-20034-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:publications/ccb81276-f784-404d-9b89-c9e1fd59270e","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/ccb81276-f784-404d-9b89-c9e1fd59270e","pdf_url":"https://ris.utwente.nl/ws/files/5338268/chp_3A10.1007_2F978-3-319-20034-7_16.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hendriks, L, Sperotto, A & Pras, A 2015, Characterizing the IPv6 Security Landscape by Large-Scale Measurements. in Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Lecture Notes in Computer Science, vol. 9122, Springer, Switzerland, pp. 145-149, 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, 22/06/15. https://doi.org/10.1007/978-3-319-20034-7_16","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01410164v1","is_oa":true,"landing_page_url":"https://hal.science/hal-01410164","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.145-149, &#x27E8;10.1007/978-3-319-20034-7_16&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-319-20034-7_16","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-20034-7_16","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-20034-7_16.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2232180256.pdf","grobid_xml":"https://content.openalex.org/works/W2232180256.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1748039315","https://openalex.org/W1851526348","https://openalex.org/W2054203875","https://openalex.org/W2088729967","https://openalex.org/W2127856832","https://openalex.org/W2185536772","https://openalex.org/W2244483357","https://openalex.org/W2258226762","https://openalex.org/W2274996773","https://openalex.org/W2278567123"],"related_works":["https://openalex.org/W2349428606","https://openalex.org/W2360869876","https://openalex.org/W3004929566","https://openalex.org/W1849784828","https://openalex.org/W2374277641","https://openalex.org/W2391251019","https://openalex.org/W2791057254","https://openalex.org/W4241708343","https://openalex.org/W2347589432","https://openalex.org/W1572473052"],"abstract_inverted_index":{"Networks":[0],"are":[1,43,48],"transitioning":[2],"from":[3],"IP":[4],"version":[5,10],"4":[6],"to":[7,104],"the":[8,15,38,67,75,87,91,97,101,105,110,118],"new":[9,18,106,121],"6.":[11],"Fundamental":[12],"differences":[13],"in":[14,29,50,96],"protocols":[16],"introduce":[17],"security":[19,41,54,95,114],"challenges":[20],"with":[21],"varying":[22],"levels":[23],"of":[24,94,112],"evidence.":[25],"As":[26],"enabling":[27],"IPv6":[28,71,84,98],"an":[30],"existing":[31,53,113],"network":[32,80],"is":[33,64],"often":[34],"already":[35],"challenging":[36],"on":[37,66,86],"functional":[39],"level,":[40],"aspects":[42],"overlooked,":[44],"even":[45],"those":[46],"that":[47,70],"emphasized":[49],"literature.":[51],"Reusing":[52],"solutions":[55,122],"for":[56,120],"IPv4":[57],"might":[58],"seem":[59],"easy":[60],"and":[61,82,116],"cost-effective,":[62],"but":[63],"based":[65],"unproven":[68],"assumption":[69],"attack":[72],"traffic":[73],"features":[74],"same":[76],"characteristics.":[77],"By":[78],"performing":[79],"measurements":[81],"analyzing":[83],"attacks":[85],"network-level,":[88],"we":[89],"determine":[90],"current":[92],"state":[93],"domain.":[99],"With":[100],"inevitable":[102],"switch":[103],"protocol":[107],"version,":[108],"assessing":[109],"applicability":[111],"approaches":[115],"determining":[117],"requirements":[119],"becomes":[123],"a":[124],"necessity.":[125]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
