Classification of IPv6 Transition Mechanisms using Multiple-Criteria Decision-Making
Received: 13 January 2025 | Revised: 10 February 2025 | Accepted: 21 February 2025 | Online: 16 April 2025
Corresponding author: Mouataz Hamdou
Abstract
IPv4-to-IPv6 transition is critical for dealing with the depletion of IPv4 addresses and ensuring the future scalability of the internet. This paper presents a systematic evaluation and ranking of 13 widely utilized IPv4-to-IPv6 transition mechanisms through a Multi-Criteria Decision-Making (MCDM) process. Initially, a methodology inspired from Bradford’s Law was applied to prioritize mechanisms in terms of how frequently they appear in the literature. Then, using the Weighted Sum Model (WSM), the current work assessed each mechanism on the basis of four key criteria: Performance (P), Security (Sec), Deployment (D), and Routing Efficiency (R). Mechanisms, such as Dual-stack, MAP-T, and NAT64, emerged as the top performers, offering sustainable scalability, high Sec, and D ease. However, mechanisms, like Teredo and 6to4, ranked lower due to significant Sec vulnerabilities, limited scalability, and P bottlenecks. The performed analysis underscores the importance of selecting transition mechanisms that balance P and Sec, particularly in large-scale networks and mobile environments. Potential areas for improvement, especially in tunneling mechanisms, are also identified and future research directions are proposed, focusing on lightweight and hybrid solutions to optimize IPv6 transition strategies.
Keywords:
network migration, IPv4, IPv6, dual-stack, tunneling, translation, weighted sum modelDownloads
References
G. K. Ordabayeva, M. Othman, B. Kirgizbayeva, Z. D. Iztaev, and A. Bayegizova, "A systematic review of transition from IPV4 to IPV6," in 6th International Conference on Engineering and MIS, Almaty, Kazakhstan, Sep. 2020, pp. 1–15.
L. Prehn, F. Lichtblau, and A. Feldmann, "When wells run dry: the 2020 IPv4 address market," in 16th International Conference on emerging Networking EXperiments and Technologies, Barcelona, Spain, Dec. 2020, pp. 46–54.
J. Beeharry and B. Nowbutsing, "Forecasting IPv4 exhaustion and IPv6 migration," in International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), Balaclava, Mauritius, Aug. 2016, pp. 336–340.
F. Abusafat, T. Pereira, and H. Santos, "Roadmap of Security threats between IPv4/IPv6," in International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, Apr. 2021, pp. 1–6.
A. El Ksimi and C. Leghris, "Contribution to Optimization and Evaluation of IPv6 Signals Based Constrained Devices Networks," Wireless Personal Communications, vol. 117, no. 3, pp. 2311–2325, Apr. 2021.
M. Piraux et al., "The multiple roles that IPv6 addresses can play in today’s internet," SIGCOMM Comput. Commun. Rev., vol. 52, no. 3, pp. 10–18, Jun. 2022.
G. Lencse and Y. Kadobayashi, "Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis," IEICE Transactions on Communications, vol. E102-B, no. 10, pp. 2021–2035, Oct. 2019.
K.-H. Li and K.-Y. Wong, "Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites," Information, vol. 12, no. 6, Jun. 2021, Art. no. 246.
A. T. H. Al-hamadani and G. Lencse, "A survey on the performance analysis of IPv6 transition technologies," Acta Technica Jaurinensis, vol. 14, no. 2, pp. 186–211, May 2021.
W. Mi, "The Applicability and Security Analysis of IPv6 Tunnel Transition Mechanisms," in International Conference on Algorithms and Architectures for Parallel Processing, Dalian, China, Aug. 2014, pp. 560–570.
Z. Ashraf, A. Sohail, S. Latif, A. Hameed, and M. Yousaf, "Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network," The International Arab Journal of Information Technology, vol. 20, no. 1, pp. 78–91, 2023.
O. D’Yab, "A Comprehensive Survey on the Most Important IPv4aaS IPv6 Transition Technologies, their Implementations and Performance Analysis," Infocommunications Journal, vol. XIV, no. 3, pp. 35–44, Nov. 2022.
S. A. Abdulla, "Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms," International Journal of Security and Networks, vol. 12, no. 2, pp. 83–102, Jan. 2017.
Y. Zhang, Y. Fu, and Q. Wang, "IPv4 to IPv6 Transition Strategy Based on Dual Stack Protocol," in Intelligent Computing Technology and Automation, Amsterdam, Netherlands: IOS Press, 2024, pp. 428–435.
S. Manimozhi and J. G. Jayanthi, "A Literature Survey on Transition Mechanisms in IPv4 and IPv6 Networks," in 4th International Conference on Intelligent Computing and Control Systems, Madurai, India, Dec. 2020, pp. 12–18.
A. Hamarsheh et al., "Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols," International Journal of Cloud Applications and Computing, vol. 13, no. 1, pp. 1–26, Jan. 2023.
G. G. Lencse and A. Bazso, "Benchmarking methodology for IPv4aaS technologies: Comparison of the scalability of the Jool implementation of 464XLAT and MAP-T," Computer Communications, vol. 219, pp. 243–258, Apr. 2024.
G. Lencse and N. Nagy, "Towards the scalability comparison of the Jool implementation of the 464XLAT and of the MAP-T IPv4aaS technologies," International Journal of Communication Systems, vol. 35, no. 18, 2022, Art. no. e5354.
S. Singalar and R. M. Banakar, "Performance Analysis of IPv4 to IPv6 Transition Mechanisms," in Fourth International Conference on Computing Communication Control and Automation, Pune, India, Aug. 2018, pp. 1–6.
T. Saraj, A. Hanan, M. S. Akbar, M. Yousaf, A. Qayyum, and M. Tufail, "IPv6 tunneling protocols: Mathematical and testbed setup performance analysis," in Conference on Information Assurance and Cyber Security, Rawalpindi, Pakistan, Dec. 2015, pp. 62–68.
K. El Khadiri, O. Labouidya, N. Elkamoun, and R. Hilal, "Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler," International Journal of Advanced Computer Science and Applications, vol. 9, no. 4, pp. 387–392, May 2018.
Z. Ashraf and M. Yousaf, "Optimized Convergence of OSPFv3 in Large Scale Hybrid IPv4-IPv6 Network," in 14th International Conference on Emerging Technologies, Islamabad, Pakistan, Nov. 2018, pp. 1–6.
A. Quintero, F. Sans, and E. Gamess, "Performance Evaluation of IPv4/IPv6 Transition Mechanisms," International Journal of Computer Network and Information Security, vol. 8, no. 2, pp. 1–14, 2016.
P. Amr and N. Abdelbaki, "Convergence study of IPv6 tunneling techniques," in 10th International Conference on Communications, Bucharest, Romania, Dec. 2014, pp. 1–6.
O. Aslan, S. S. Aktug, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions," Electronics, vol. 12, no. 6, Jan. 2023, Art. no. 1333.
J. Kumar and G. Ranganathan, "Malware Attack Detection in Large Scale Networks using the Ensemble Deep Restricted Boltzmann Machine," Engineering, Technology & Applied Science Research, vol. 13, no. 5, pp. 11773–11778, Oct. 2023.
J. Kristoff, M. Ghasemisharif, C. Kanich, and J. Polakis, "Plight at the end of the tunnel: Legacy ipv6 transition mechanisms in the wild," in International Conference on Passive and Active Network Measurement, Cottbus, Germany, Mar. 2021, pp. 390–405.
G. Lencse and Y. Kadobayashi, "Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64," Computers & Security, vol. 77, pp. 397–411, Aug. 2018.
K. Gu, L. Zhang, Z. Wang, and Y. Kong, "Comparative studies of IPv6 tunnel security," in 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, Guilin, China, Jul. 2017, pp. 2799–2804.
W. Alzaid and B. Issac, "Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks," International Journal of Business Data Communications and Networking, vol. 12, no. 1, pp. 36–62, Jan. 2016.
N. Chuangchunsong, S. Kamolphiwong, T. Kamolphiwong, R. Elz, and P. Pongpaibool, "Performance evaluation of IPv4/IPv6 transition mechanisms: IPv4-in-IPv6 tunneling techniques," in The International Conference on Information Networking, Phuket, Thailand, Feb. 2014, pp. 238–243.
A. S. Ahmed, R. Hassan, and N. E. Othman, "Security threats for IPv6 transition strategies: A review," in 4th International Conference on Engineering Technology and Technopreneuship, Kuala Lumpur, Malaysia, Aug. 2014, pp. 83–88.
P. A. Alvarez, A. Ishizaka, and L. Martínez, "Multiple-criteria decision-making sorting methods: A survey," Expert Systems with Applications, vol. 183, Nov. 2021, Art. no. 115368.
A. Singh, "Major MCDM Techniques and their application-A Review," IOSR Journal of Engineering, vol. 4, no. 5, pp. 15–25, May 2014.
A. K. Babar, Z. A. Zardari, S. Qureshi, S. Han, and N. N. Hussaini, "Assessment of IPv4 and IPv6 Networks with Different Modified Tunneling Techniques using OPNET," International Journal of Advanced Computer Science and Applications, vol. 10, no. 9, pp. 476–482, Jan. 2019.
M. Georgescu, H. Hazeyama, T. Okuda, Y. Kadobayashi, and S. Yamaguchi, "The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies:," in 2nd International Conference on Information Systems Security and Privacy, Rome, Italy, Feb. 2016, pp. 243–254.
S. Narayan, S. Ishrar, A. Kumar, R. Gupta, and Z. Khan, "Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols," in Thirteenth International Conference on Wireless and Optical Communications Networks, Hyderabad, India, Jul. 2016, pp. 1–7.
J. L. Shah and J. Parvez, "An examination of next generation IP migration techniques: Constraints and evaluation," in International Conference on Control, Instrumentation, Communication and Computational Technologies, Kanyakumari, India, Jul. 2014, pp. 776–781.
D. Hadiya, R. Save, and G. Geetu, "Network Performance Evaluation of 6to4 and Configured Tunnel Transition Mechanisms: An Empirical Test-Bed Analysis," in 6th International Conference on Emerging Trends in Engineering and Technology, Nagpur, India, Dec. 2013, pp. 56–60.
M. Aazam, A. M. Syed, S. A. H. Shah, I. Khan, and M. Alam, "Evaluation of 6to4 and ISATAP on a test LAN," in IEEE Symposium on Computers & Informatics, Kuala Lumpur, Malaysia, Mar. 2011, pp. 46–50.
L. Smith, M. Jacobi, and S. Al-Khayatt, "Evaluation of IPv6 transition mechanisms using QoS service policies," in 11th International Symposium on Communication Systems, Networks & Digital Signal Processing, Budapest, Hungary, Jul. 2018, pp. 1–5.
T. T. Lu, C. Y. Wu, W. Y. Lin, H. P. Chen, and K. P. Hsueh, "Comparison of IPv4-over-IPv6 (4over6) and Dual Stack Technologies in Dynamic Configuration for IPv4/IPv6 Address," in Advances in Intelligent Information Hiding and Multimedia Signal Processing, J.-S. Pan, P.-W. Tsai, and H.-C. Huang, Eds. New York, NY, USA: Springer, 2017, pp. 259–269.
Y. Sookun and V. Bassoo, "Performance analysis of IPv4/IPv6 transition techniques," in IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), Balaclava, Mauritius, Aug. 2016, pp. 188–193.
G. Altangerel, E. Tsogbaatar, and D. Yamkhin, "Performance analysis on IPv6 transition technologies and transition method," in 11th International Forum on Strategic Technology, Novosibirsk, Russia, Jun. 2016, pp. 465–469.
J. S. Sansa-Otim and A. Mile, "IPv4 to IPv6 Transition Strategies for Enterprise Networks in Developing Countries," in International Conference on e-Infrastructure and e-Services for Developing Countries, Blantyre, Malawi, Nov. 2013, pp. 94–104.
S. Narayan, R. Gupta, A. Kumar, S. Ishrar, and Z. Khan, "Cyber security attacks on network with transition mechanisms," in International Conference on Computing and Network Communications, Trivandrum, India, Dec. 2015, pp. 163–169.
Komal, "Performance Evaluation of Tunneling Mechanisms in IPv6 Transition: A Detailed Review," in Second International Conference on Advances in Computing and Communication Engineering, Dehradun, India, Dec. 2015, pp. 144–149.
M. Georgescu, H. Hazeyama, Y. Kadobayashi, and S. Yamaguchi, "Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed," EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, vol. 2, no. 2, Feb. 2015, Art. no. e1.
M. Aazam and E.-N. Huh, "Impact of ipv4-ipv6 coexistence in cloud virtualization environment," annals of telecommunications - annales des telecommunications, vol. 69, no. 9, pp. 485–496, Oct. 2014.
A. S. Wahid, M. Othman, O. Sembiyev, and M. H. Selamat, "Performance of cpu utilization for IPv6 tunneling mechanisms on linux based testbed," Eurasian Journal of Mathematical and Computer Applications, vol. 2, no. 3, pp. 30–42, 2014.
F. Sans and E. Gamess, "Analytical performance evaluation of native IPv6 and several tunneling technics using benchmarking tools," in XXXIX Latin American Computing Conference, Caracas, Venezuela, Oct. 2013, pp. 1–9.
B. C. Brookes, "Bradford’s Law and the Bibliography of Science," Nature, vol. 224, no. 5223, pp. 953–956, Dec. 1969.
D. J. Borgohain, Verma ,Manoj Kumar, Nazim ,Mohammad, and M. and Sarkar, "Application of Bradford’s law of scattering and Leimkuhler model to information science literature," COLLNET Journal of Scientometrics and Information Management, vol. 15, no. 1, pp. 197–212, Jan. 2021.
Downloads
How to Cite
License
Copyright (c) 2025 Mouataz Hamdou, M'barek El Haloui, Ali El Ksimi, Badia Ettaki

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.