{"id":"https://openalex.org/W2198282146","doi":"https://doi.org/10.17487/rfc9099","title":"Operational Security Considerations for IPv6 Networks","display_name":"Operational Security Considerations for IPv6 Networks","publication_year":2021,"publication_date":"2021-08-01","ids":{"openalex":"https://openalex.org/W2198282146","doi":"https://doi.org/10.17487/rfc9099","mag":"2198282146"},"language":"en","primary_location":{"id":"doi:10.17487/rfc9099","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036747724","display_name":"\u00c9ric Vyncke","orcid":"https://orcid.org/0000-0001-6115-3340"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"\u00c9. Vyncke","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080629780","display_name":"Kiran Kumar Chittimaneni","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. Chittimaneni","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015617949","display_name":"Merike Kaeo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. Kaeo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5002509075","display_name":"Enno Rey","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E. Rey","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036747724"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9433000087738037,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9433000087738037,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6492472887039185},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5414254069328308},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5143010020256042},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.423186331987381},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13016614317893982},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09092056751251221}],"concepts":[{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6492472887039185},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5414254069328308},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5143010020256042},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.423186331987381},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13016614317893982},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09092056751251221}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc9099","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2349428606","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W2360633292"],"abstract_inverted_index":{"Knowledge":[0],"and":[1,65,68,70],"experience":[2],"on":[3],"how":[4],"to":[5,43],"operate":[6],"IPv4":[7],"securely":[8],"is":[9,12],"available:\nwhether":[10],"it":[11],"the":[13,32,82],"Internet":[14,83],"or":[15],"an":[16],"enterprise":[17],"internal":[18],"network.":[19],"However,\nIPv6":[20],"presents":[21],"some":[22],"new":[23],"security":[24,55],"challenges.":[25],"RFC":[26],"4942":[27],"describes":[28],"the\nsecurity":[29],"issues":[30,56],"in":[31,57],"protocol":[33],"but":[34],"network":[35,79],"managers":[36],"also":[37],"need":[38],"a":[39,61,78],"more\npractical,":[40],"operations-minded":[41],"document":[42,52],"enumerate":[44],"advantages":[45],"and/or\ndisadvantages":[46],"of":[47,60,77,84],"certain":[48],"choices.":[49],"This":[51],"analyzes":[53],"the\noperational":[54],"several":[58],"places":[59],"network\n(enterprises,":[62],"service":[63],"providers":[64],"residential":[66],"users)":[67],"proposes\ntechnical":[69],"procedural":[71],"mitigations":[72],"techniques.":[73],"Some":[74],"very":[75],"specific\nplaces":[76],"such":[80],"as":[81],"Things":[85],"are":[86],"not":[87],"discussed\nin":[88],"this":[89],"document.":[90]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
