<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yc-ipv6-for-ioa-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Capabilities and Future Requirements of IPv6 for IoA">Capabilities and Future Requirements of IPv6 for the Internet of Agents (IoA)</title>
    <seriesInfo name="Internet-Draft" value="draft-yc-ipv6-for-ioa-01"/>
    <author initials="J." surname="Ye" fullname="Jiaming Ye">
      <organization>China Mobile</organization>
      <address>
        <email>yejiaming@chinamobile.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="14"/>
    <area>General</area>
    <workgroup>V6OPS</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 42?>
<t>In the coming years, the accelerating proliferation of agentic AI is anticipated to drive the number of intelligent agents to reach the scale of hundreds of billions. IPv6, with vast address space, native end-to-end connectivity and rich built-in functionalities, serves as the critical infrastructure underpinning the development of the Internet of Agents (IoA). This draft systematically analyzes the foundational capabilities that IPv6 can provide for the IoA at the current stage, and further explores the evolutionary requirements that the IoA imposes on the future IPv6 development.</t>
    </abstract>
  </front>
  <middle>
    <?line 45?>

<section anchor="intro">
      <name>Introduction</name>
      <t>As artificial intelligence (AI) technology undergoes a transition from Generative AI to Agentic AI, the global number of AI agents is projected to reach approximately 900 billion by the end of this decade. AI agents, integrating core capabilities such as large language models (LLM), memory systems, tool calling, and task planning, possess the ability to perceive their environment, make autonomous decisions, and execute tasks efficiently, thereby placing new demands on the network infrastructure. Constrained by limited address space, IPv4 struggles to support secure end-to-end connectivity among massive numbers of AI agents. Consequently, the evolution to IPv6-only is not merely a technological upgrade but also a foundational enabler for the large-scale development of agents. As the core protocol for the next-generation Internet, IPv6, with vast address space, native end-to-end connectivity and rich built-in functionalities, serves as the critical infrastructure underpinning the development of the Internet of Agents (IoA).</t>
      <t>This draft systematically analyzes the foundational capabilities that IPv6 can provide for the IoA at the current stage, and further explores the evolutionary requirements that the IoA imposes on the future IPv6 development.</t>
      <section anchor="terminology">
        <name>Terminology</name>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="ipv6-enabled-capabilities-for-ioa">
      <name>IPv6-Enabled Capabilities for IoA</name>
      <section anchor="vast-address-space">
        <name>Vast Address Space</name>
        <t>IPv6 employs a 128-bit address architecture, offering approximately 3.4×10³⁸ unique IPv6 addresses, which fundamentally resolves the exhaustion of the IPv4 addresses. In the context of IoA, where a vast number of agents necessitate exact addresses for intercommunication, the expansive address space of IPv6 is of critical importance. It enables the assignment of globally unique addresses to every agent, sensor, or container instance, thereby simplifying service discovery, facilitating horizontal scaling, and allowing for fine-grained identity mapping. As the population of agents grows exponentially, this native capability, which eliminates the need for address reuse, will become the cornerstone supporting a trillion-agent network.</t>
      </section>
      <section anchor="end-to-end-reachability">
        <name>End-to-End Reachability</name>
        <t>The adoption of IPv6 eliminates the dependency on Network Address Translation (NAT), thereby streamlining network design and enabling lower-latency communication. First, the removal of NAT facilitates genuine end-to-end direct communication by assigning a unique global address to each agent. This is essential for the IoA, as it empowers agents to perform point-to-point coordination, task scheduling, and direct orchestration without reliance on intermediate nodes for forwarding or address translation. Furthermore, this end-to-end reachability can reduce the overhead of connection establishment and session lookup introduced by NAT, thereby simplifying coordination protocols among agents and minimizing communication latency.</t>
      </section>
      <section anchor="slaac-and-mobility">
        <name>SLAAC and Mobility</name>
        <t>For certain types of agents, particularly those operating in dynamic environments such as mobile devices, drones and connected vehicles, mobility constitutes a critical characteristic, as these agents frequently need to switch between different network access points. IPv6 provides native support for this requirement through Stateless Address Autoconfiguration (SLAAC).</t>
        <t>SLAAC enables devices to autonomously generate IPv6 addresses upon connecting to a network, thereby equipping agents with the capability for rapid network attachment and dynamic readdressing without manual intervention. This realizes "plug-and-play" operation. For systems tasked with managing large-scale deployments of mobile agents, such automated configuration substantially reduces administrative overhead. Moreover, IPv6's robust support in constrained networks further enhances the mobility of edge agents, allowing them to seamlessly roam across access points without communication disruption.</t>
      </section>
      <section anchor="srv6-for-remote-management-and-path-control">
        <name>SRv6 for Remote Management and Path Control</name>
        <t>Segment Routing over IPv6 (SRv6) further enhances network intelligence and programmability. By embedding instructions in the IPv6 extension header, SRv6 enables fine-grained path control, allowing the network to dynamically adjust traffic flows based on application requirements. This provides a powerful foundation for the remote management and path optimization of agents. In the context of the IoA, the contributions of SRv6 can be observed across several aspects: First, through flexible path programming, SRv6 enables the establishment of deterministic forwarding paths for packets, thereby achieving ultra-low-latency transmission. This allows agents to rapidly upload locally computed preliminary results to the cloud, realizing the separation of storage and computation while ensuring that raw data remains local and securely isolated. Second, SRv6 supports network slicing, enabling the creation of dedicated virtual networks tailored to diverse agent applications, thereby guaranteeing the quality of service for critical tasks. Third, the integration with application identifiers endows the network with the awareness of upper-layer applications. By embedding application-layer semantic information (e.g., service type, Service Level Agreement (SLA) requirements such as low latency, high bandwidth, and high reliability) directly into IPv6 packets, the network can automatically trigger the corresponding forwarding paths or service function chains.</t>
      </section>
    </section>
    <section anchor="future-requirements-for-ipv6">
      <name>Future Requirements for IPv6</name>
      <section anchor="elevated-security">
        <name>Elevated Security</name>
        <t>The disappearance of NAT, while a advantage of IPv6, also poses new security challenges. In the IPv4 era, NAT unintentionally provided a layer of "obscurity protection" that internal device addresses remained invisible to external network, thereby reducing the risk of direct attacks. With IPv6, however, agents are directly exposed to the public network and are globally addressable, which demands the implementation of more robust host-level security mechanisms. For the IoA, this implies the deployment of finer-grained firewall policies, access control lists (ACLs), and identity authentication. Therefore, it is imperative to establish an advanced security for the IPv6-based IoA to control access based on identity, continuously monitor behaviors, and detect anomalies.</t>
      </section>
      <section anchor="privacy-and-persistence">
        <name>Privacy and Persistence</name>
        <t>The temporary addresses that randomly generated and constantly changed, help protect a topological location and identity from being exposed to eavesdroppers and other information collectors  <xref target="RFC3041"/>. However, this pivacy extension also introduces challenges for the communications of agents that require long-lived sessions. In the IoA, persistent connections are often necessary to achieve state synchronization and task continuity, yet the frequent changes of addresses may disrupt the stability of such long-lived sessions.</t>
        <t>Striking a balance between privacy protection and session persistence thus emerges as a critical issue for the IoA. On one hand, it is necessary to protect the location, identity, and activities of agents from malicious tracking; on the other hand, it is essential to ensure that the communications of agents performing critical tasks can maintain stability. Addressing this tension may require more sophisticated address management strategies, such as dynamically selecting address types based on task sensitivity and communication patterns, or setting fixed identifiers at the application layer that are independent of addresses.</t>
      </section>
      <section anchor="evolution-of-threat-defense">
        <name>Evolution of Threat Defense</name>
        <t>The vast address space of IPv6 significantly raises the cost of large-scale attacks that based on address scanning. Attackers can no longer enumerate all possible addresses as easily as in IPv4 space, even the state-of-the-art academic scanning tools can only discover tens of millions of IPv6 hosts within the 2^128 address space. However, they may also exploit IPv6-specific features (e.g., IPv6 extension header, Neighbor Discovery Protocol (NDP)) to launch novel attacks, or leverage the vast address space to rapidly mutate source addresses and evade detection. Therefore, threat defense strategies must be reassessed in the IPv6 era.</t>
        <t>In the IoA, IPv6 provides abundant address resources for agents, yet the increasing proliferation of agents and IoT devices may become new attack sources and could be potentially exploited to amplify attack. Traffic analysis and scrubbing as the core traditional DDoS defense, face significant challenges in meeting real-time analysis and scrubbing requirements due to the far greater complexity of IPv6 protocol types and address structures compared to IPv4. Legacy scrubbing mechanisms, originally designed for simple packet characteristics in IPv4 environments, are now required to perform deep parsing and exact matching of complex IPv6 addresses within massive traffic flows, leading to a surge in processing overhead for existing security devices.</t>
        <t>SRv6 carries programmable path, enabling on-demand service assurance and customized quality of service for agent-based applications. However, this mechanism can be abused to launch various targeted attacks. For instance, an attacker may craft SRv6 packets with excessively long Segment Lists, forcing intermediate endpoints to consume substantial CPU resources to farse extension header; By tampering with the SRH, an attacker can cause packets to bypass specific nodes (e.g., accounting nodes, security service nodes); Or attackers maliciously construct looping paths (e.g., A→B→C→A) to exhaust bandwidth, resulting in exponential traffic amplification in multi-agent collaboration. Therefore, to better support the implementation of IoA, the design and deployment of SRv6 security mechanisms must be accelerated.</t>
        <t>To effectively support the Internet of AI Agents, security capabilities must be strengthened through a three perspectives: first, refining threat detection rules for IPv6-specific attacks, including NDP spoofing, extension header manipulation, and fragment attacks; second, expediting the enhancement of SRv6 security mechanisms; and third, upgrading security devices with AI-powered real-time traffic analysis to enable rapid anomaly detection, thereby bolstering the real-time performance and accuracy of defenses against increasingly intelligent attacks in the IPv6 environment.</t>
      </section>
      <section anchor="monitoring-and-management">
        <name>Monitoring and Management</name>
        <t>Building an IPv6-based comprehensive network observability framework is essential to better support the efficient operation of the Internet of Agents (IoA). This requires the establishment of IPv6-native telemetry and monitoring capabilities, along with corresponding updates to threat detection rules. However, current monitoring systems provide insufficient support for IPv6, with many legacy tools exhibiting deficiencies in handling IPv6 formats, extension headers, and specific behaviors. For instance, the IPv6 Flow Label field, which can be used to mark traffic priority at the packet level, remains largely underutilized by existing monitoring tools. Meanwhile, the address changes introduced by privacy extensions render traditional address-based tracking and auditing methods ineffective, further undermining network visibility. Furthermore, inconsistencies in the processing of IPv6 extension headers introduce additional complexity to network monitoring: Different devices handle IPv6 packets with extension headers in varied ways. For example, some may forward them normally, others may silently ignore them, and some may even discard them outright.</t>
        <t>Therefore, data sampling and monitoring tools must be fully adapted to IPv6, ranging from correct interpretation of extension header semantics to the effective utilization of various specialized fields， so as to ensure continuous observation and analysis of agents' operations and behaviors, as well as timely anomaly detection.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3041">
          <front>
            <title>Privacy Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document describes an extension to IPv6 stateless address autoconfiguration for interfaces whose interface identifier is derived from an IEEE identifier. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3041"/>
          <seriesInfo name="DOI" value="10.17487/RFC3041"/>
        </reference>
      </references>
    </references>
    <?line 132?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
