Javascript must be enabled to continue!
Construction Security Architecture of the Internet of Things Based on IPv6 Technology
View through CrossRef
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address. IPv6 provides a wide range of security policies for Internet of Things safety system. The security of the Internet of Things applications interface IPv6 address can be used to identify the node. This paper proposes construction security architecture of the Internet of Things based on IPv6 technology. In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Title: Construction Security Architecture of the Internet of Things Based on IPv6 Technology
Description:
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address.
IPv6 provides a wide range of security policies for Internet of Things safety system.
The security of the Internet of Things applications interface IPv6 address can be used to identify the node.
This paper proposes construction security architecture of the Internet of Things based on IPv6 technology.
In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Related Results
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Introducción a IPv6
Introducción a IPv6
Introducción a IPv6
Introduction to IPv6
Edwin Salazar Vega
Universidad Nacional de Piura
DOI: https://doi.org/10.33017/RevECIPeru2011.0023/
RESUMEN
Como es de conocimiento p...
Architecture between heteronomy and self-generation
Architecture between heteronomy and self-generation
Introduction
«I have never worked in the technocratic exaltation, solving a constructive problem and that’s it. I’ve always tried to interpret the space of human life» (Vitto...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Toward All-IP networks : IP and wireless networks convergence
Toward All-IP networks : IP and wireless networks convergence
In this thesis the state of the art for IP networks and the two most predominant wireless access networks, UMTS and Wireless LANs, has been reviewed with respect to the enhancement...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Exchanging the data packets seems as very challenging task due to exponential growth in network interface. Meanwhile, this increased interface makes use of next generation of inter...
I6-FPS: Automating the ICMPv6 Filtering Rules
I6-FPS: Automating the ICMPv6 Filtering Rules
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively fi...

