| International Journal of Computer Applications |
| Foundation of Computer Science (FCS), NY, USA |
| Volume 187 - Number 70 |
| Year of Publication: 2025 |
| Authors: Joy Selasi Agbesi |
10.5120/ijca2025926028
|
Joy Selasi Agbesi . DHCPv6 Security Threats in Smart City Infrastructure: A Comprehensive Case Study of USA Municipalities. International Journal of Computer Applications. 187, 70 ( Dec 2025), 14-25. DOI=10.5120/ijca2025926028
The proliferation of Internet Protocol version 6 (IPv6) in smart city infrastructure has introduced significant security vulnerabilities, particularly within Dynamic Host Configuration Protocol version 6 (DHCPv6) implementations. This comprehensive study examines DHCPv6 security threats affecting municipal infrastructure across the United States, analyzing critical vulnerabilities identified between 2023 and 2025. Through systematic analysis of documented exploits including CVE-2023-20080, CVE-2023-28231, and CVE-2024-38063, this research reveals that 73% of surveyed municipalities lack comprehensive DHCPv6 security protocols. The study employs a rigorous mixed-methods approach combining vulnerability assessment frameworks (utilizing Nmap v7.94 with IPv6 scripts, THC-IPv6 toolkit v3.8, and Nessus Professional v10.5), quantitative network traffic analysis using Wireshark v4.0, structured surveys (n=93, response rate 73%), and detailed case studies from five major US cities representing diverse operational contexts (populations ranging from 68,000 to 850,000). Statistical analysis employed IBM SPSS Statistics v28.0 for correlation analysis (Pearson r), multiple regression modeling, and inferential statistics with significance testing at α=0.05 level. Findings indicate that DHCPv6 rogue server attacks (82% of vulnerable municipalities), denial-of-service vulnerabilities (43% of Cisco-equipped municipalities), and address spoofing represent the most prevalent threats to municipal IoT networks, with public Wi-Fi infrastructure showing the highest vulnerability rate (86%, n=104). The research demonstrates through controlled penetration testing (600+ trials across five replicated test environments) that implementing rate-limiting mechanisms, DHCPv6 guard features, and network segmentation reduces successful attack vectors by approximately 84%, with rogue server vulnerability reduction of 89% (p<0.001) when DHCPv6 guard features are enabled. Attack simulation experiments validated practical exploitability with 94% success rate for rogue server attacks (average exploitation time: 12.3 ± 3.1 minutes) and 87% success rate for denial-of-service attacks against CVE-2023-20080 vulnerabilities (average recovery time: 43.1 ± 12.3 minutes). This study contributes to the growing body of knowledge on smart city cybersecurity by providing empirical evidence of DHCPv6 vulnerabilities, quantitative analysis of countermeasure effectiveness, and proposing a comprehensive five-phase security framework tailored for municipal implementations. The practical implications extend to policymakers, network administrators, and urban planners responsible for securing critical infrastructure in increasingly interconnected urban environments.