This paper is published in Volume-4, Issue-3, 2018
Area
Information Technology
Author
Mustapha Mboob, Ousman Manjang
Org/Univ
Sri Venkateswara College of Engineering Technology, Chittoor, Andhra Pradesh, India
Pub. Date
05 June, 2018
Paper ID
V4I3-1734
Publisher
Keywords
IPv6; Network security, Security - Vulnerabilities, Autonomous car

Citationsacebook

IEEE
Mustapha Mboob, Ousman Manjang. Effect of IPV6 security vulnerabilities on the future of autonomous car, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Mustapha Mboob, Ousman Manjang (2018). Effect of IPV6 security vulnerabilities on the future of autonomous car. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.

MLA
Mustapha Mboob, Ousman Manjang. "Effect of IPV6 security vulnerabilities on the future of autonomous car." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.

Abstract

An autonomous car may be a mystery to many but in real life application it is actually placeable but with the latest internet version protocol (IPV 6) to which automobile companies are running away from due to vulnerabilities it possesses. The autonomous car is generally a self-driven car via the internet a simple car we can talk to, communicate to in real life time domain, without the need for an individual to be in the actual wheel, on the other hand, IPv6 is the latest version of internet protocol that is used for communication via the internet. but due to security concern of IPv6 many organization have slowed their migration to the newest version of this internet protocol. Generally, the autonomous car is driven via the internet and it could have worked best with the help of a well secure internet since IPv6 can accommodate a greater number of host compare to IPv4. This paper covers and reviews some of the fundamental vulnerabilities topics of IPv6 security, considerations, issues, and threats. In the end, it summarizes some of the most common security concerns the new suite of protocols creates.