The Application Research of IPv6 Technology in the Security Architecture of the Internet of Things


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The perception layer of Internet of Things using IP technology will need a large number of IP address resources currently available IPv4 address resources point of view, far unable to meet the networking needs-aware intelligent terminal. IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address. The security of the Internet of Things applications interface IPv6 address can be used to identify the node. IPv6 provides a wide range of security policies for Internet of Things safety system. This paper proposes the application research of IPv6 technology in the security architecture of the Internet of Things. In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


IPv6; Internet of Things; IP Address; Perception Layer

Full Text:

PDF


References


Quan-jie Qiu, Xiao-rong Tang, Xing-fu Wang, Zhong-fu Wu, The End-to-end IPv6 Network Available Bandwidth Measurement and Analysis, IJACT, Vol. 4, No. 5, pp. 256 ~ 264, 2012

Kyung-Heoun Lee, Don-Sub Lee, Hong-Jae Shin, Kae-Dal Kwack, A Study on the IPv6 Transition Plan in the Field of Meteorological Data Collection and Exchange, RNIS, Volume 2, pp. 4 ~ 9, 2008

Pyung-Soo Kim, and Yong Jin Kim, Hierarchical Mobile IPv6 Based Fast Vertical Handover using IEEE 802.21 Media Independent Handover Function, JCIT, Vol. 2, No. 4, pp. pp.41 ~ pp.45, 2007

S. D. Adeniji, S. Khatun, M. A. Borhanuddin, R. S. A. Raja Abdullah, An Approach Design and Analysis of Resource Management Software for Multihoming In-Vehicle of IPv6 Network, International Review on Computers and Software (IRECOS), Vol. 3 N. 2, pp. 193-198, 2008

Hocheal Kim, An Enhancement of FMIPv6 for the Packet Radio Networks which Supports the QoS Provisioning on the MIPv6 , JDCTA, Vol. 3, No. 2, pp. 33 ~ 41, 2009

Nitul Dutta, Iti Saha Misra, Abhishek Majumder, Mathematical Analysis of Signaling Overhead in MIPv6 Based N-Layer Architecture, JCIT, Vol. 5, No. 8, pp. 252 ~ 261, 2010.

D. Kavitha, K. E. Sreenivasa Murthy, B. Sathyanarayana, V. Raghunatha Reddy, S. Zahoor ul Huq, A Certificate Based Inquisition Approach for Routing Optimization in Mobile IPv6, International Review on Computers and Software (IRECOS), Vol. 5, N. 1, pp. 71-76, 2010

Lei Zhao, Xiaoping Li, Qingkuan Dong, Lei Shi, An IKEv2 Based Security Authentication Scheme for Mobile Network, AISS, Vol. 3, No. 9, pp. 191 ~ 198, 2011

KANG Hong-yan, Design and Realization of Internet of Things Based on Embedded System Used in Intelligent Campus, IJACT, Vol. 3, No. 11, pp. 291 ~ 298, 2011

Chen Wang, Yuntian Teng, Pan Deng, Research of Device Collaboration Middleware based on QoS in Internet of Things, International Review on Computers and Software (IRECOS), Vol. 7, n. 4, pp. 1541-1546, 2012

Peng Li, Junping Dong, Junhao Wen, Wei Zhou, A SOA-Based Service Discovery Framework in Internet of Things, JCIT, Vol. 6, No. 9, pp. 310 ~ 315, 2011

Han Xiao, Yuanjiang Li, A New Thought based on the Service Composition of Automatic Transmission Semantic Grid in Internet of Things, IJACT, Vol. 3, No. 7, pp. 10 ~ 16, 2011

Xiaoliang Wang, Xingming Sun, Hengfu Yang, Saeed Arif Shah, An Anonymity and Authentication Mechanism for Internet of Things, JCIT, Vol. 6, No. 3, pp. 98 ~ 105, 2011

Hong Ning, Xuefeng Zheng, A Security Protocol at Transport Layer Supported MECC Algorithm for the Internet of Things, International Review on Computers and Software (IRECOS), Vol. 7, n. 6, pp. 3153-3156, 2012.

Zhenxin Qu, Research on Semantic Processing for Internet of Things Based on Cloud Computing, IJACT, Vol. 4, No. 16, pp. 339 ~ 346, 2012

Ken Cai, Internet of Things Technology Applied in Field Information Monitoring, AISS, Vol. 4, No. 12, pp. 405 ~ 414, 2012.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize