Securing mobile architectures
IPv6 Transition and Security in mobile networks
Article REF: TE7514 V1
Securing mobile architectures
IPv6 Transition and Security in mobile networks

Author : David BINET

Publication date: November 10, 2014 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. Securing mobile architectures

When deploying IPv6, the operator's primary objective is to ensure that the move to a new IP protocol version is transparent to the end user. As such, customers must be able to access services without restriction, and must not suffer any inconvenience due to a change in their type of connectivity.

This evolution must be transparent for the operator. It is therefore essential that the operator guarantees that the introduction of IPv6 will not give rise to problems due to a lack of protection. The operator must guarantee that the security level of the mobile infrastructure, once the new IP protocol version has been introduced, is at least equivalent to that observed before the introduction of IPv6. This requires the operator to assess its IPv4 network and service security architecture, and to master the new vulnerabilities induced by the IPv6 protocol and protect...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Networks and Telecommunications"

( 170 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details