{"id":"https://openalex.org/W2810984043","doi":"https://doi.org/10.1109/fskd.2017.8393224","title":"Comparative studies of IPv6 tunnel security","display_name":"Comparative studies of IPv6 tunnel security","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2810984043","doi":"https://doi.org/10.1109/fskd.2017.8393224","mag":"2810984043"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2017.8393224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110472202","display_name":"Gu KeJun","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kejun Gu","raw_affiliation_strings":["China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China"],"affiliations":[{"raw_affiliation_string":"China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101582251","display_name":"Liancheng Zhang","orcid":"https://orcid.org/0009-0009-2064-1167"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liancheng Zhang","raw_affiliation_strings":["China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China"],"affiliations":[{"raw_affiliation_string":"China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402735","display_name":"Zhenxing Wang","orcid":"https://orcid.org/0000-0002-5390-827X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenxing Wang","raw_affiliation_strings":["China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China"],"affiliations":[{"raw_affiliation_string":"China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074259078","display_name":"Yazhou Kong","orcid":"https://orcid.org/0000-0002-6454-6681"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yazhou Kong","raw_affiliation_strings":["China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China"],"affiliations":[{"raw_affiliation_string":"China National Digital Switching System Engineering and Technological Research Center, Zhengzhou City, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110472202"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6216,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7469238,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2799","last_page":"2804"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.8944584131240845},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.741223156452179},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.7238891124725342},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.666184663772583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5794858932495117},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5724310278892517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5541688799858093},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.438286691904068},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4321382939815521},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4311930537223816},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22024664282798767},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07052060961723328}],"concepts":[{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.8944584131240845},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.741223156452179},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.7238891124725342},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.666184663772583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5794858932495117},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5724310278892517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5541688799858093},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.438286691904068},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4321382939815521},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4311930537223816},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22024664282798767},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07052060961723328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2017.8393224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2017.8393224","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1532068859","https://openalex.org/W1587570841","https://openalex.org/W1851526348","https://openalex.org/W2024560152","https://openalex.org/W2025199196","https://openalex.org/W2063632971","https://openalex.org/W2165668490","https://openalex.org/W2167984772","https://openalex.org/W2295137676","https://openalex.org/W2398695787","https://openalex.org/W2535359085","https://openalex.org/W2545699897","https://openalex.org/W6631939447","https://openalex.org/W6635358580","https://openalex.org/W6638715035","https://openalex.org/W6684616167","https://openalex.org/W6713107623"],"related_works":["https://openalex.org/W2349428606","https://openalex.org/W2129227231","https://openalex.org/W2360869876","https://openalex.org/W3004929566","https://openalex.org/W1849784828","https://openalex.org/W2374277641","https://openalex.org/W2391251019","https://openalex.org/W2791057254","https://openalex.org/W4241708343","https://openalex.org/W2233041126"],"abstract_inverted_index":{"Along":[0],"with":[1,16],"the":[2,28,38,42],"deployment":[3,40],"of":[4,41],"IPv6":[5,17],"is":[6],"becoming":[7],"more":[8,10,45,47],"and":[9,46,65,70,83],"widely,":[11],"IPv4":[12],"networks":[13,18],"will":[14],"coexist":[15],"for":[19,31,90],"a":[20,32],"relatively":[21],"long":[22],"time.":[23],"The":[24,53],"tunnel":[25,43,58],"mechanisms":[26,59],"are":[27,68,73,87],"best":[29],"choice":[30],"smooth":[33],"transition":[34],"to":[35],"IPv6.":[36],"With":[37],"wild":[39],"mechanisms,":[44],"security":[48,54],"issues":[49],"have":[50],"been":[51],"noticed.":[52],"problems":[55],"faced":[56],"by":[57],"such":[60],"as":[61],"injection,":[62],"address":[63],"spoofing":[64],"reflector":[66],"attack":[67],"analyzed,":[69],"corresponding":[71],"countermeasures":[72],"concluded":[74],"into":[75],"three":[76],"directions:":[77],"filter,":[78],"deep":[79],"packet":[80],"inspection":[81],"(DPI)":[82],"IPsec.":[84],"Some":[85],"questions":[86],"pointed":[88],"out":[89],"research":[91],"in":[92],"next":[93],"steps.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
