{"id":"https://openalex.org/W7128530026","doi":"https://doi.org/10.48550/arxiv.2602.08891","title":"Rethinking IPv6 Defense: A Unified Edge-Centric Zero-Trust Data-Plane Architecture","display_name":"Rethinking IPv6 Defense: A Unified Edge-Centric Zero-Trust Data-Plane Architecture","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128530026","doi":"https://doi.org/10.48550/arxiv.2602.08891"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.08891","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015916901","display_name":"Walid Aljoby","orcid":"https://orcid.org/0000-0002-0976-9962"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aljoby, Walid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122648674","display_name":"Mohammed ALzayani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alzayani, Mohammed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098182399","display_name":"Patwary Et al.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hossain, Md. Kamrul","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5008319184","display_name":"Khaled A. Harras","orcid":"https://orcid.org/0000-0002-1327-9077"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Harras, Khaled A.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015916901"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.367900013923645,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.367900013923645,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.18799999356269836,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.18019999563694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.6913999915122986},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.626800000667572},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.6007000207901001},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5666000247001648},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5267999768257141},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.5264000296592712},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.5205000042915344},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.47350001335144043},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4717999994754791},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46239998936653137}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7364000082015991},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.6913999915122986},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.626800000667572},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.6007000207901001},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5666000247001648},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5267999768257141},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.5264000296592712},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.5205000042915344},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.47350001335144043},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4717999994754791},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46239998936653137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4429999887943268},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.398499995470047},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35109999775886536},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.34940001368522644},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C204142451","wikidata":"https://www.wikidata.org/wiki/Q11097","display_name":"IPv6 address","level":4,"score":0.2854999899864197},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2784000039100647},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C55356503","wikidata":"https://www.wikidata.org/wiki/Q2136675","display_name":"Reference architecture","level":4,"score":0.2754000127315521},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.27140000462532043},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25839999318122864},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2535000145435333},{"id":"https://openalex.org/C48947383","wikidata":"https://www.wikidata.org/wiki/Q830719","display_name":"Visitor pattern","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.08891","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.08891","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.08891","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.08891","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.45089608430862427,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"IPv6":[0,6],"dependability":[1],"is":[2,89],"increasingly":[3],"inseparable":[4],"from":[5,148],"security:":[7],"Neighbor":[8],"Discovery":[9],"(ND),":[10],"Router":[11],"Advertisements":[12],"(RA),":[13],"and":[14,29,39,82,126,131,142,152,162,166],"ICMPv6":[15],"are":[16],"essential":[17],"for":[18,27,108],"correct":[19],"operation":[20],"yet":[21],"expose":[22],"a":[23,61,67,116,135,149,158],"broad":[24],"attack":[25],"surface":[26],"spoofing":[28],"flooding.":[30,84],"Meanwhile,":[31],"IPv6's":[32],"massive":[33],"address":[34],"space":[35],"breaks":[36],"per-IP":[37],"reputation":[38],"makes":[40],"many":[41],"defenses":[42],"either":[43],"non-scalable":[44],"or":[45,55],"narrowly":[46],"scoped":[47],"(e.g.,":[48],"only":[49,52,56],"internal":[50,78,83],"threats,":[51],"RA":[53],"abuse,":[54],"volumetric":[57],"floods).":[58],"We":[59,114,145],"propose":[60],"zero-trust":[62],"edge":[63],"architecture":[64],"implemented":[65],"in":[66],"single":[68],"programmable":[69],"data-plane":[70],"pipeline":[71,156],"that":[72,105],"unifies":[73],"four":[74],"modules:":[75],"external":[76,80],"spoofing,":[77,79],"flooding,":[81],"A":[85],"key":[86],"design":[87,119],"choice":[88],"to":[90],"enforce":[91],"identity":[92],"plausibility":[93],"before":[94],"rate":[95],"plausibility:":[96],"stateless":[97],"per-packet":[98],"validation":[99],"filters":[100],"spoofed":[101],"traffic":[102],"early":[103],"so":[104],"time-window":[106],"statistics":[107],"flooding":[109],"operate":[110],"on":[111,157],"credible":[112],"identities.":[113],"outline":[115],"concrete":[117],"P4":[118],"(prefix":[120],"Hop-Limit":[121],"bands,":[122],"DAD-anchored":[123],"address-port":[124],"bindings,":[125],"Count-Min":[127],"Sketch":[128],"windowed":[129],"counting)":[130],"evaluate":[132],"it":[133],"across":[134],"systematic":[136],"15-scenario":[137],"suite":[138],"spanning":[139],"single-,":[140],"dual-,":[141],"multi-vector":[143],"compositions.":[144],"report":[146],"results":[147],"BMv2":[150],"prototype":[151],"validate":[153],"the":[154],"same":[155],"Netronome":[159],"NFP-4000":[160],"SmartNIC,":[161],"we":[163],"discuss":[164],"limitations":[165],"open":[167],"directions.":[168]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-11T00:00:00"}
