Wednesday, March 4, 2020

Finally, the New Federal IPv6-Only Policy Is Here!!!


Finally, the new federal #IPv6-only policy is here for public comments: https://www.federalregister.gov/d/2020-04202!!

The OMB draft memo is here: https://www.cio.gov/…/…/internet-protocol-version6-draft.pdf


#ipv4 #ipv6 #ai #iot #5g #ipv6only #internet #internetofthefuture #cybersecurity #cyberattacks #cybersecuritythreats #cloudsecurity #datasecurity #databreach #dataprotection #emergingtechnology #cyber


Disclaimer: The views presented are only personal opinions and they do not necessarily represent those of the U.S. Government.

Monday, February 17, 2020

Plan to Sunset Internet Protocol Version 4 Now!

In 2014 I said: Stop Using IPv4!

In 2016 I said: No IoT without IPv6!

In 2018 I said: 100% IPv6 by 2029!

In 2020 I said: Plan to Sunset IPv4 Now!

The world is now moving towards securely deploying IPv6 only by turning off IPv4, are you ready?


Partial List of References and Credits to My Articles:

The following is a partial listing of my publications and many of the references to my articles made in the academic and research papers, professional conferences proceedings, books, articles, and many other websites, including, but not limited to, numerous professional journals and academic publications, such as International Journal of Advanced Research in Computer Science and Software Engineering, International Journal for Innovative Research in Multidisciplinary Field, First Amendment Law Review by University of North Carolina School of Law, Asian Journal of Mathematical Sciences, Sciendo, Academia.edu, and many popular sites such as Google Scholar, Wikipedia, in addition to many IDG Communications, Inc. affiliated news outlets, publications: Computerworld, CIO.com, InfoWorld, NetworkWorld:

Publications:
https://www.computerworld.com/article/2488886/stop-using-internet-protocol-version-4-.html
https://www.cio.com/article/2376632/stop-using-internet-protocol-version-4-.html
https://www.infoworld.com/article/2607476/stop-using-internet-protocol-version-4-.html
https://www.computerworld.com/article/3071625/no-iot-without-ipv6.html
https://www.cio.com/article/3072499/no-iot-without-ipv6.html
https://www.hstoday.us/subject-matter-areas/cybersecurity/adopting-and-enforcing-an-ipv6-only-policy-if-not-now-when/
https://www.hstoday.us/subject-matter-areas/cybersecurity/perspective-strengthening-online-security-and-privacy-by-adopting-the-best-security-standards-now/
https://www.hstoday.us/subject-matter-areas/cybersecurity/future-of-the-internet-depends-on-global-adoption-of-ipv6/
https://www.hstoday.us/subject-matter-areas/infrastructure-security/perspective-cyberwarfare-is-mission-possible-only-if-we-stop-using-ipv4/

Referenced by the Professional Journals and Academic Publications:
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) ISSN: 2277-128X (Volume-8, Issue-9)
International Journal for Innovative Research in Multidisciplinary Field (IJIRMF)
First Amendment Law Review by University of North Carolina School of Law
Asian Journal of Mathematical Sciences (AJMS)
Proceedings of the International Conference on Business Excellence Volume 12: Issue 1; ISSN: 2558-9652; First Published: 15 Dec 2017

Connectivity of Assistance Systems (Konnektivität von Assistenzsystemen)

Referenced by and Credited in the Academic Research Papers, Conference Proceedings, Books, Articles:
1. Cybersecurity of the Person:https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3276218
2. Defining the IoT: https://content.sciendo.com/view/journals/picbe/12/1/article-p118.xml
3. Societal Adoption Problems of Internet of Things (IoT)-A Study: International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-8, Issue-9)
4. Smart Healthcare System:A Primer: https://www.academia.edu/38842515/Smart_Healthcare_System_A_Primer
5. Evaluating IoT Device Security: https://fraserdumayne.co.uk/projects/dissertation.pdf
6. CyBOK: Cyber-Physical Systems Security Knowledge Area: https://www.cybok.org/media/downloads/Cyber-Physical_Systems_KA_-_draft_for_review_January_2019.pdf
7. Hardware/Software Interoperability and Single Point Vulnerability Problems of Internet of Things Multiple Systems: Causes, Solution and Societal Adoption: https://www.academia.edu/38842160/Hardware_Software_Interoperability_and_Single_Point_Vulnerability_Problems_of_Internet_of_Things_Multiple_Systems_Causes_Solution_and_Societal_Adoption
8. Telecommunication & Information Technologies - телекоммуникационные и информационные технологии (v5.2, September 1, 2019): http://book.itep.ru/4/44/ip6_4411.htm
9. Konzeption und Entwicklung eines sprachgesteuerten Smart Home Systems unter Betrachtung des Internet of Things: https://epb.bibl.th-koeln.de/frontdoor/deliver/index/docId/1182/file/Konzeption+und+Entwicklung+eines+sprachgesteuerten+Smart+Home+Systems+unter+der+Ber%C3%BCcksichtigung+des+Internet+of+Things.pdf
10. Využití Apache Cordova k práci s Photon Particle (Using Apache Cordova to Work With Photon Particle): https://theses.cz/id/z9prcm/21202882
11. Trend to Watch in Marketing: Internet of Things: http://blog.isme.in/2015/05/trend-to-watch-in-marketing-internet-of.html
12. An Amateur’s Look at IoT Security and Its Processes: https://www.academia.edu/36747931/iotsec.odt


Social Media:
https://twitter.com/cioonline/status/461918363544190977
https://www.facebook.com/APNIC/posts/10153429156791058

Google Scholar:
https://scholar.google.com/scholar?cites=18135843595810044648&as_sdt=20000005&sciodt=0,21&hl=en&scioq=%22Stop+Using+Internet+Protocol+Version+4!%22
https://scholar.google.com/scholar?cluster=18135843595810044648&hl=en&as_sdt=20000005&sciodt=0,21
https://scholar.google.com/scholar?cites=18135843595810044648&as_sdt=20000005&sciodt=0,21&hl=en
https://scholar.google.com/scholar?q=%22No+IoT+without+IPv6%22&hl=en&as_sdt=0,21

Wikipedia:
https://en.wikipedia.org/wiki/Internet_of_things
https://ia.wikipedia.org/wiki/Internet_del_objectos
https://vi.wikipedia.org/wiki/Internet_V%E1%BA%A1n_V%E1%BA%ADt
https://wikivisually.com/wiki/Internet_of_things
https://techconcepts750961224.wordpress.com/2019/03/30/internet-of-things/
https://www.limswiki.org/index.php/Internet_of_things
https://www.wikizero.com/en/Internet_of_things
https://worddisk.com/wiki/Internet_of_things/
https://infogalactic.com/info/Internet_of_things
https://epo.wikitrans.net/IPv6


My Personal Social Media and Blogger Sites:
https://ipv6czar.wordpress.com/2016/05/09/ipv6-is-the-future-of-the-internet/
https://ipv6czar.wordpress.com/2020/03/01/plan-to-sunset-internet-protocol-version-4-now/



Articles Posted by Other Websites Worldwide:

https://si-management.blogspot.com/2014/05/stop-using-internet-protocol-version-4.html
http://cyber-informer.blogspot.com/2014/05/stop-using-internet-protocol-version-4.html
http://book.itep.ru/depository////ipv6/asset_upload_file842_2515.pdf
http://home.etf.rs/~vm/os/vlsi/predavanja/internetOfThings.pdf
http://www.popflock.com/learn?s=Internet_of_Things_(IoT)
https://www.moycom.de/english/strategies-solutions/internet-of-things-iot/
http://phdomeraydin.blogspot.com/2016/
https://acordocoletivo.org/2016/09/10/internet-of-things/
http://138.201.196.77/index.php/component/content/category/30-technology
https://m.blog.naver.com/PostView.nhn?blogId=wind5700&logNo=220931052387&proxyReferer=https%3A%2F%2Fwww.google.com%2F
https://epo.wikitrans.net/IPv6
http://syakiebarsalan21.blogspot.com/2016/10/internet-of-things.html
https://docu.tips/documents/ipv6-5c12c340b9db6
http://www.google-software.net/2016/09/02/iot-internet-of-things/
https://it4developers.wordpress.com/pm/metodologias/internet-of-things/
http://ahmadyusuf1f.blogspot.com/2016/10/internet-of-things.html
http://si-management.blogspot.com/p/reseaux-et-infrastructures.html
http://syakiebarsalan21.blogspot.com/2016/10/internet-of-things.html
http://theeconomicrealms.blogspot.com/2015/05/the-internet-of-things.html
https://m.blog.naver.com/PostView.nhn?blogId=wind5700&logNo=220931052387&proxyReferer=https%3A%2F%2Fwww.google.com%2F

Saturday, February 15, 2020

A Case of Plagiarism in the IEEE Article

There are multiple instances of plagiarism found in the IEEE article published on July 17, 2017, titled “IPv6 and Internet of Things: Prospects for Latin America”, in which the author, Rosa Delgado, used exactly the same words in the same order in the same sentence within the same context from one of my articles published more than one year earlier without giving credit or crediting the source.

Almost four years ago I wrote the original opinion article titled “No IoT without IPv6” and it was first published by Computerworld and then republished by CIO.com on May 19, 2016. My original opinion article discusses extensively the global adoption of IPv6 and its impact on the future of the Internet of Things (IoT). In addition, three of my related articles on the exact same subject were first published online in my personal blog sites on WordPress, Blogger, and LinkedIn on June 2, 2016. See the following links for my original article published by Computerworld and CIO.com and personal websites:

https://www.computerworld.com/article/3071625/no-iot-without-ipv6.html
https://www.cio.com/article/3072499/no-iot-without-ipv6.html
https://ipv6czar.blogspot.com/2016/06/iot-is-ultimate-driver-for-global.html
https://ipv6czar.wordpress.com/2016/06/02/iot-is-the-ultimate-driver-for-global-adoption-of-ipv6/
https://www.linkedin.com/pulse/iot-ultimate-driver-global-adoption-ipv6-charles-sun/

As a matter of fact, since 2014 I have written and published more than a dozen related articles on this same subject and I have been speaking and invited to speak publicly on many occasions at national and international conferences and public events on this and similar topics, including two of my opinion articles were published by Computerworld since May 2014.

Moreover, since the publication by Computerworld of my original opinion article titled "Stop Using Internet Protocol Version 4!" on May 1, 2014, and a related opinion article titled "No IoT Without IPv6" on May 19, 2016, many references to my articles have been made by publications in the academic and professional communities, international professional journals, societies in multiple languages. many of my ideas, statements, and opinions stated in my articles have been frequently credited in many of the academic research papers, international academic and professional conferences' proceedings, papers, articles, and books, among others, on the subjects related to IPv6 and IoT, which include, but not limited to the following:
  • International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
  • International Journal for Innovative Research in Multidisciplinary Field (IJIRMF):
  • Asian Journal of Mathematical Sciences (AJMS)
  • Proceedings of the International Conference on Business Excellence Volume 12: Issue 1; ISSN: 2558-9652
  • First Amendment Law Review by University of North Carolina School of Law
For instance, in my May 1, 2014 opinion article published by Computerworld, CIO.com, and subsequently republished by many other publications including NetworkWorld, InfoWorld, among others, I specifically stated that "the Internet of Things will depend on the successful implementation of IPv6" and that "To a large extent, the Internet of Things will be the ultimate driver of global adoption of IPv6 in the coming years". This stated opinion and similar statements have since been widely cited and repeated in many of those academic research papers and professional journal publications, some of which are listed in the References section of this article at the end.

Sadly, however, a few people, on the other hand, seem to have no shame or decency nowadays and would rather engage in plagiarism in their writings and/or online postings than do the right thing by using the proper citations and giving credit to the original sources of information used in their publications as they should. As far as the intellectual properties (IP) is concerned, if you don't own those ideas or used other people's words in your writing and speeches, then you must cite those resources properly and give the appropriate credit to the original source! This is a minimum, low ethical and academic standard that people have to follow in conducting their research and publications. Otherwise, if you choose to plagiarize in your writings, you will be caught and exposed, sooner or later.

For instance, I recently discovered an article published by IEEE on July 17, 2017, for its IEEE Internet of Things collection titled “IPv6 and Internet of Things: Prospects for Latin America”, in which the author, Rosa Delgado, wrote about the same subject on IPv6 and IoT that I have been writing and speaking publicly about since 2014.

Most disturbingly, however, the author not only failed to properly credit the original source of information used for the IEEE article published in 2017 but also used the exact same words and phrase, such as “No IoT Without IPv6”, among others, in the exact same order in a single sentence within the same context of the article on the very same subject, that I originally used in my opinion article first published more than 14 months earlier by Computerworld on May 19, 2016! As a matter of fact, those four words used by the author of the IEEE article are actually the exact same words used for the title of my original opinion article published more than one year earlier by Computerworld, CIO.com, NetworkWorld, and many of IDG Communications, Inc. affiliated news outlets, publications.

According to the Cambridge Dictionary, the word "plagiarize" means to use another person's ideas or work and pretend that it is your own. The Merriam-Webster dictionary, further explains that "plagiarize" means:
  • to steal and pass off (the ideas or words of another) as one's own
  • to use (another's production) without crediting the source
  • to commit literary theft
  • to present as new and original an idea or product derived from an existing source
Per the definitions provided by the article published on plagiarism.org website, the following are considered plagiarism:
  • copying words or ideas from someone else without giving credit
  • changing words but copying the sentence structure of a source without giving credit
Upon a closer examination comparing the IEEE article published in 2017 and my original article published more than a year earlier in 2016, it becomes very clear that there is sufficient evidence of plagiarism contained in the IEEE article published on July 17, 2017.

Here I will only highlight two such instances of plagiarism found in the IEEE article on IPv6 and IoT published by IEEE on July 17, 2017:

First, in its last sentence of the first paragraph of the 2017 IEEE article, the author wrote:

As a result, there is no IoT without IPv6.

The title for my 2016 opinion article published by Computerworld more than one year earlier is No IoT without IPv6.

The author of the IEEE article used exactly the same words in the same order in the same sentence within the same context from my article published more than one year earlier without any proper citation or credit provided to the original source used in the IEEE article. In this case, the author of the IEEE article copied the same words from my original article's title without giving credit or crediting the source.

Second, in the first sentence of the third paragraph of the 2017 IEEE article, the author wrote:

IPv6 is about vision, leadership, innovation and competitive edge.

In my 2016 opinion article which was first published by Computerworld more than one year earlier, listed as the fifth reason for my statements made in my opinion article titled “No IoT without IPv6”, I wrote:

5. Adopting IPv6 is a matter of leadership, vision and competitive edge.

The following screenshots showing the side by side comparison of the two published articles, explicitly depict the two instances of plagiarism found in the IEEE article:


Once again, it is crystal clear that, as demonstrated in this instance, the author of the IEEE article copied the same words from my article published more than one year earlier and used those same words in almost exactly the same order in the same sentence within the same context of the discussion on the same topic in the IEEE article about the same subject on IPv6 and IoT without giving credit or crediting the source. Those are examples of blatant intellectual property theft known as plagiarism!

The author of the IEEE article should have properly credited the original source of the information used in the article and should have given the credit where credit is due when those words and/or ideas do not come directly from the author originally. But unfortunately, the author failed to do so repeatedly throughout the article.

Based on the above analysis and the examination of the material facts as identified and presented, it is very clear that despite some apparent attempts made by the author of the article to change some of the words or the order of those words in the sentence structure in the IEEE article, the author had failed to provide the proper citations and giving credit to the original source of information used in the article. In other words, the author had committed plagiarism by copying the words or changing words but copying the sentence structure of a source without giving credit, which is considered plagiarism per the aforementioned definitions.

In short, based on the meaning of plagiarism defined, the examples of plagiarism cited, the evidence of plagiarism demonstrated, the screenshots shown, and for the reasons and analysis provided herein, the author of the IEEE article had committed plagiarism in the IEEE article in the current format published by IEEE on its website, plain and simple!

Otherwise, if this piece of IEEE article on the subject of IPv6 and IoT is not considered plagiarism based on the identified instances of plagiarism, then what is plagiarism?!

Given the fact that this article is part of the IEEE the official collection of documents related to IoT, the ethical rules and academic research standards must be met and maintained. Consequently, I would like the IEEE to start an investigation on this apparent plagiarism incidence as reported herein and provide me and the general public an acceptable explanation as to what actually occurred in this very serious matter of IP violations in one of its official publications.

IEEE, the world is watching!

References

The following is a partial listing of my publications and many of the references to my articles made in the academic and research papers, professional conferences proceedings, books, articles, and many other websites, including, but not limited to, numerous professional journals and academic publishers, such as International Journal of Advanced Research in Computer Science and Software Engineering, International Journal for Innovative Research in Multidisciplinary Field, First Amendment Law Review by University of North Carolina School of Law, Asian Journal of Mathematical Sciences, Sciendo, Academia.edu, and many popular sites such as Google Scholar, Wikipedia, in addition to many IDG Communications, Inc. affiliated news outlets, publications: Computerworld, CIO.com, InfoWorld, NetworkWorld:

Publications:
https://www.computerworld.com/article/2488886/stop-using-internet-protocol-version-4-.html
https://www.cio.com/article/2376632/stop-using-internet-protocol-version-4-.html
https://www.infoworld.com/article/2607476/stop-using-internet-protocol-version-4-.html
https://www.computerworld.com/article/3071625/no-iot-without-ipv6.html
https://www.cio.com/article/3072499/no-iot-without-ipv6.html
https://www.hstoday.us/subject-matter-areas/cybersecurity/adopting-and-enforcing-an-ipv6-only-policy-if-not-now-when/
https://www.hstoday.us/subject-matter-areas/cybersecurity/perspective-strengthening-online-security-and-privacy-by-adopting-the-best-security-standards-now/
https://www.hstoday.us/subject-matter-areas/cybersecurity/future-of-the-internet-depends-on-global-adoption-of-ipv6/
https://www.hstoday.us/subject-matter-areas/infrastructure-security/perspective-cyberwarfare-is-mission-possible-only-if-we-stop-using-ipv4/

Referenced by the Professional Journals and Academic Publishers:
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) ISSN: 2277-128X (Volume-8, Issue-9)
International Journal for Innovative Research in Multidisciplinary Field (IJIRMF)
First Amendment Law Review by University of North Carolina School of Law
Asian Journal of Mathematical Sciences (AJMS)
Proceedings of the International Conference on Business Excellence Volume 12: Issue 1; ISSN: 2558-9652; First Published: 15 Dec 2017
First Amendment Law Review by University of North Carolina School of Law

Referenced by and Credited in the Academic Research Papers, Conference Proceedings, Books:
  1. Cybersecurity of the Person:https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3276218
  2. Defining the IoThttps://content.sciendo.com/view/journals/picbe/12/1/article-p118.xml
  3. Societal Adoption Problems of Internet of Things (IoT)-A StudyInternational Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-8, Issue-9)
  4. Smart Healthcare System:A Primerhttps://www.academia.edu/38842515/Smart_Healthcare_System_A_Primer
  5. Evaluating IoT Device Securityhttps://fraserdumayne.co.uk/projects/dissertation.pdf
  6. CyBOK: Cyber-Physical Systems Security Knowledge Areahttps://www.cybok.org/media/downloads/Cyber-Physical_Systems_KA_-_draft_for_review_January_2019.pdf
  7. Hardware/Software Interoperability and Single Point Vulnerability Problems of Internet of Things Multiple Systems: Causes, Solution and Societal Adoptionhttps://www.academia.edu/38842160/Hardware_Software_Interoperability_and_Single_Point_Vulnerability_Problems_of_Internet_of_Things_Multiple_Systems_Causes_Solution_and_Societal_Adoption
  8. Telecommunication & Information Technologies - телекоммуникационные и информационные технологии (v5.2, September 1, 2019): http://book.itep.ru/4/44/ip6_4411.htm
  9. Konzeption und Entwicklung eines sprachgesteuerten Smart Home Systems unter Betrachtung des Internet of Thingshttps://epb.bibl.th-koeln.de/frontdoor/deliver/index/docId/1182/file/Konzeption+und+Entwicklung+eines+sprachgesteuerten+Smart+Home+Systems+unter+der+Ber%C3%BCcksichtigung+des+Internet+of+Things.pdf
  10. Využití Apache Cordova k práci s Photon Particle (Using Apache Cordova to Work With Photon Particle)https://theses.cz/id/z9prcm/21202882
  11. Trend to Watch in Marketing: Internet of Thingshttp://blog.isme.in/2015/05/trend-to-watch-in-marketing-internet-of.html
  12. An Amateur’s Look at IoT Security and Its Processes: https://www.academia.edu/36747931/iotsec.odt
Social Media:
https://twitter.com/cioonline/status/461918363544190977

Google Scholar:
https://scholar.google.com/scholar?cites=18135843595810044648&as_sdt=20000005&sciodt=0,21&hl=en&scioq=%22Stop+Using+Internet+Protocol+Version+4!%22
https://scholar.google.com/scholar?cluster=18135843595810044648&hl=en&as_sdt=20000005&sciodt=0,21
https://scholar.google.com/scholar?cites=18135843595810044648&as_sdt=20000005&sciodt=0,21&hl=en
https://scholar.google.com/scholar?q=%22No+IoT+without+IPv6%22&hl=en&as_sdt=0,21

Wikipedia:
https://en.wikipedia.org/wiki/Internet_of_things
https://ia.wikipedia.org/wiki/Internet_del_objectos
https://vi.wikipedia.org/wiki/Internet_V%E1%BA%A1n_V%E1%BA%ADt
https://wikivisually.com/wiki/Internet_of_things
https://techconcepts750961224.wordpress.com/2019/03/30/internet-of-things/
https://www.limswiki.org/index.php/Internet_of_things
https://www.wikizero.com/en/Internet_of_things
https://worddisk.com/wiki/Internet_of_things/
https://infogalactic.com/info/Internet_of_things
https://epo.wikitrans.net/IPv6

My Personal Social Media and Blogger Sites:
https://ipv6czar.blogspot.com/2016/06/iot-is-ultimate-driver-for-global.html
https://voice4ipv6.wordpress.com/2016/06/02/iot-is-the-ultimate-driver-for-global-adoption-of-ipv6/
https://www.linkedin.com/pulse/iot-ultimate-driver-global-adoption-ipv6-charles-sun/


Articles Posted by Other Websites Worldwide:

https://si-management.blogspot.com/2014/05/stop-using-internet-protocol-version-4.html
http://cyber-informer.blogspot.com/2014/05/stop-using-internet-protocol-version-4.html
http://book.itep.ru/depository////ipv6/asset_upload_file842_2515.pdf
http://home.etf.rs/~vm/os/vlsi/predavanja/internetOfThings.pdf

Referenced by Other Websites Based on Google Search Results:
http://www.popflock.com/learn?s=Internet_of_Things_(IoT)
https://www.moycom.de/english/strategies-solutions/internet-of-things-iot/
http://phdomeraydin.blogspot.com/2016/
https://acordocoletivo.org/2016/09/10/internet-of-things/
http://138.201.196.77/index.php/component/content/category/30-technology
https://m.blog.naver.com/PostView.nhn?blogId=wind5700&logNo=220931052387&proxyReferer=https%3A%2F%2Fwww.google.com%2F
https://epo.wikitrans.net/IPv6
http://syakiebarsalan21.blogspot.com/2016/10/internet-of-things.html
https://docu.tips/documents/ipv6-5c12c340b9db6
http://www.google-software.net/2016/09/02/iot-internet-of-things/
https://it4developers.wordpress.com/pm/metodologias/internet-of-things/
http://ahmadyusuf1f.blogspot.com/2016/10/internet-of-things.html
http://si-management.blogspot.com/p/reseaux-et-infrastructures.html
http://syakiebarsalan21.blogspot.com/2016/10/internet-of-things.html
http://theeconomicrealms.blogspot.com/2015/05/the-internet-of-things.html
https://m.blog.naver.com/PostView.nhn?blogId=wind5700&logNo=220931052387&proxyReferer=https%3A%2F%2Fwww.google.com%2F

#cybersecurity #cyberattacks #cybersecuritythreats #cloudsecurity #cyber #ipv4 #ipv6 #ai #iot #5g #ipv6only #internet #internetofthefuture #datasecurity #databreach #dataprotection #emergingtechnology #IEEE #IEEEXplore

Disclaimer: The views presented are only personal opinions and they do not necessarily represent those of the U.S. Government.

Friday, February 14, 2020

Adopting and Enforcing an IPv6-Only Policy: If Not Now, When?

Charles Sun


As the next-generation Internet Protocol, IPv6 (Internet Protocol version 6) is the prerequisite for the future growth and development of the Internet. In the era of artificial intelligence (AI), 5G, and Internet of Things (IoT), there are increasingly more and more innovations and emerging technologies that will be heavily relying on the support of the Internet, which is currently running in the so-called dual-stack of mode operations using both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). Moreover, adopting and enforcing the IPv6-only policy worldwide by securely deploying the single stack of IPv6, turning off IPv4, and setting a specific deadline to sunset IPv4 completely, will dramatically reduce the overall cybersecurity threats and attacks based on IPv4.

Therefore, the IPv6-only policy is not only the most effective and efficient approach to protect and defend our new cyber frontier but also the best weapon we have in cyber warfare. Here are the reasons why:

First, despite hundreds of billions of dollars are spent globally each year on cybersecurity, organizations worldwide, big or small, are still struggling around the clock every single day to deal with constant cyberattacks and data breaches, most of which are based on the current predominate version of Internet Protocol - IPv4. This seems to be a losing battle that one can hardly see the light at the end of the tunnel anytime soon, let alone gain an upper hand in the fight.

In 2018, for instance, there were more than 41,600 security incidents reported and over 2,000 confirmed data breaches worldwide, notwithstanding we spent more than $114 billion worldwide in 2018 on cybersecurity. In other words, there were more than 114 reported security incidents on average every day in 2018, approximately six of which were confirmed data breaches, costing the global economy more than $1.5 trillion with over $2,900,000 being lost to cybercrime every minute! One related report predicts that cybercrime will cost the world over $6 trillion annually by 2021. Meanwhile, a study in 2019 predicted that global spending on cybersecurity products and services would exceed $1 trillion cumulatively over the five years from 2017 to 2021. A similar study estimated that worldwide spending on information security-related products and services reached over $124 billion in 2019 alone with an increase of more than 141 percent since 2010. According to one of the Gartner’s forecast analyses, the global information security market will reach $170.4 billion in 2022.

Second, the situation can only get worse in a few more years when the IPv6 adoption rate will reach 100 percent running in parallel with IPv4, effectively doubling the overall attack vectors. According to one estimate, based on the current trend the global IPv6 adoption rate will reach 100 percent in 2028.

Based on the latest Internet Society’s State of IPv6 Deployment 2018 report, worldwide IPv6 deployment has increased dramatically since 2012. For instance, in 2018 more than 80 percent of smartphones in the US already used IPv6, and the mobile wireless carriers are rapidly becoming an IPv6-only market with 93.69% of T-Mobile USA mobile users already using IPv6. Furthermore, many companies including Facebook, Google, Microsoft, are adopting an IPv6-only policy by turning off IPv4 internally within their enterprises.

Consequently, the federal government also seems ready to resume its leadership role in driving the IPv6 adoption across all federal agencies. The Department of Defense (DOD), for example, after many years of missing in action, finally restarted the effort to deploy very aggressively IPv6 across all of its components based on the recently published DOD CIO memo on IPv6, which in turn will undoubtedly have a huge influence on the creation of a new federal policy on IPv6 deployment across all federal agencies. The impact of such a new federal IPv6 policy on both the public and private sectors cannot be underestimated.
                                           
Third, adopting an IPv6-only policy to securely deploy the single stack of IPv6 globally and to sunset IPv4 will dramatically reduce the overall cybersecurity threats and attacks based on IPv4! It is a material fact that we will immediately achieve a 100 percent reduction of all current global cyberattacks and cybersecurity threats based on IPv4 the moment we turn off IPv4. We will also immediately achieve more than 50 percent reduction globally of the overall cyberattacks based on IPv4 and IPv6 separately, and the combination of both collectively.

Consequently, we must change our cybersecurity strategy dramatically right now to efficiently secure and effectively defend the global cyberinfrastructure before the time is running out. Our whole paradigm of cybersecurity and cyber defense policy must be completely shifted to focus on securely deploying the single stack of IPv6 worldwide instead of running and supporting both IPv4 and IPv6 simultaneously, engaging the enemies in two separate battlegrounds concurrently, fighting two separate wars with limited resources. We should and must utilize all of our global resources wisely and concentrate on fighting and winning only one war! The IPv6-only policy is not only the best weapon we have in cyber warfare but also our last chance to effectively protect the cyberspace and efficiently defend our new digital frontier.

Now it is high time to create and enforce an IPv6-only policy worldwide by turning off IPv4 and set a specific deadline to sunset IPv4 globally.

It is not a question as to whether or not we should adopt and enforce an IPv6-only policy by turning off and sunsetting IPv4, but rather a question that we all must ask: if not now, when?!

Disclaimer: The views presented are only personal opinions and they do not necessarily represent those of the U.S. Government.


Reference for this article:

Sun, Charles. “Adopting and Enforcing an IPv6-Only Policy: If Not Now, When?” Homeland Security Today. 11 February 2020.


#cybersecurity #cyberattacks #cybersecuritythreats #cloudsecurity #cyber #ipv4 #ipv6 #ai #iot #5g #ipv6only #internetofthefuture


Thursday, June 2, 2016

IoT Is the Ultimate Driver for Global Adoption of IPv6!

Since my recent article entitled “No IoT without IPv6” published by Computerworld, many people have provided very good feedback and comments. They also have asked a very good question: Why we are still talking about adopting IPv6 after so many years? It has been more than a decade since the U. S. government first formally requested federal agencies to adopt IPv6 and incorporate it in their enterprise architecture (EA) as stated in the 2005 OMB Memo; and it has been more than two decades since many people first started talking about the need to transition to IPv6.

Obviously, there are many reasons for the delays of IPv6 adoption worldwide. On one hand, as I commented previously in some of my online postings, changes are always difficult and many people simply don't like change. A lot of people also consider that IPv6 is boring because it is related to the network infrastructure.

On the other hand, many people don't understand it or simply don't care about it because, at the end of the day, IPv6 is a technical matter. For instance, IPv6 as part of the internet-layered protocols, is often, but not always, considered roughly as a subset of the Network Layer of the ISO OSI model. Not many people outside of the networking infrastructure or similar domains are familiar with it or care enough about it.

To make things even more unnecessarily complicated, while some people with non-technical background would like to constantly drag such a technical issue into the messy geopolitical discussions and debates in the international forums, many people involved with the research of IoT do not even think that they will ever need to use IPv6 or IP at all, because they are only focusing on different layers of the OSI model in their specific part of the world. Some individuals even think that they can deploy IoT using IPv4 and NAT.

In addition, the message on this technical issue must be clear, precise, and consistent, and it must be easy for the non-technical people to understand. However, that is not always the case. In my opinion, for far too many years, this technical issue of transitioning to IPv6 from IPv4 has become way too complicated, whether intentionally by some people or not.

As I wrote in an article last year entitled “IPv6, It's Easier Than You Think!”, ultimately, enabling IPv6 is only a configuration change to the existing networking infrastructure! This is especially true when we only enable the IPv6 in a dual-stack mode of operations (using both IPv6 and IPv4) where there is NO impact on the existing IPv4 functions or operations during the transition period.

It cannot be more clear and simple than that. Consequently, one should ask: when was the last time that the Board of Directors or the president of a company has to decide and approve an IT configuration change request for its network infrastructure, which not only does not impact its current IPv4 operations, but also is completely transparent to the end users?

In the final analysis, however, money is still one of the main reasons that have hindered the global IPv6 adoption so far. In many cases, at least as in the past, adopting and deploying IPv6 not only does not immediately generate revenue, but cost money: It needs money to train the engineers and IT staff about IPv6; it costs money to upgrade the existing network infrastructure and systems to enable IPv6 if they are dated; it doesn't provide the immediate ROI. For many companies, it doesn't help with the short-term share prices or meet the Wall Street expectations for the quarterly earnings and revenues in the short run...

As a result, there has been no particular incentive for many companies, especially for those companies in the networking and security business, such as network hardware manufactures and software application companies, to invest in R&D to fully support IPv6 and to ensure that all of their current products and services will support the full feature set of IPv6 as much as they would for IPv4.

If the major networking manufacturers and security companies cannot ensure that all of their current products and services will fully support IPv6, it will undoubtedly prevent the customers from deploying IPv6 easily and smoothly even if they want to. If the current security appliances and software cannot fully support IPv6, how can you expect the customers to fully adopt IPv6 without the fear that their IPv6 deployment may not be secured or at least as secured as the current IPv4 products and services, even though the level of security in IPv4 is still questionable given what is happening on a daily basis in cybersecurity breaches nowadays?

This all comes down to the point as I mentioned in my article that adopting IPv6 requires long term vision and leadership from the top management of the companies. They must realize that adopting IPv6 is a competitive edge for their companies as well as for their shareholders in the long run, especially in the global context.

Most importantly, the whole concept is simple, the goal is clear, the scope of the task is precise, and it is worth repeating here again:

Adopting and deploying the new Internet Protocol version 6 (IPv6) is only a configuration change to the existing IT infrastructure. 

By enabling a separate IPv6 stack in the current IPv4 computing environment (dual-stack) during the transition period, it will not impact the existing IPv4 functions or operations.

If we can all communicate consistently and precisely this idea to the non-technical stakeholders as well as the regular Internet users, I am confident that many people will be able to comprehend this issue and eventually be supportive of this global initiative.

The good news is that for the past a few years, especially for the past year or two, many companies started to realize the potential huge impact of IoT on their bottom line. After all, IoT represents at least several trillion dollars’ new business opportunities for many companies around the world.

That is why we have seen that worldwide IPv6 traffic have increased rather significantly since 2014 based on some of the IPv6 indicators, such as the information provided by Google – from less than 3% in 2014 to over 11% in May 2016.

It is for this reason that over two years’ ago I stated in my opinion article published by Computerworld on May 1, 2014 that “To a large extent, the Internet of Things will be the ultimate driver of global adoption of IPv6 in the coming years.

Today, I still strongly believe that IoT will be the ultimate driver for global adoption of IPv6 for the very same reason, just as passionate as I was two years ago.

Only time will tell and history will be the judge.


Reference for this article:

Sun, Charles. “IoT Is the Ultimate Driver for Global Adoption of IPv6!”. 2 June 2016. https://ipv6czar.blogspot.com/2016/06/iot-is-ultimate-driver-for-global.html

Disclaimer: The views presented are only personal opinions and they do not necessarily represent those of the U.S. Government.