Javascript must be enabled to continue!
Construction Security Architecture of the Internet of Things Based on IPv6 Technology
View through CrossRef
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address. IPv6 provides a wide range of security policies for Internet of Things safety system. The security of the Internet of Things applications interface IPv6 address can be used to identify the node. This paper proposes construction security architecture of the Internet of Things based on IPv6 technology. In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Title: Construction Security Architecture of the Internet of Things Based on IPv6 Technology
Description:
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address.
IPv6 provides a wide range of security policies for Internet of Things safety system.
The security of the Internet of Things applications interface IPv6 address can be used to identify the node.
This paper proposes construction security architecture of the Internet of Things based on IPv6 technology.
In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Related Results
Introducción a IPv6
Introducción a IPv6
Introducción a IPv6
Introduction to IPv6
Edwin Salazar Vega
Universidad Nacional de Piura
DOI: https://doi.org/10.33017/RevECIPeru2011.0023/
RESUMEN
Como es de conocimiento p...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Toward All-IP networks : IP and wireless networks convergence
Toward All-IP networks : IP and wireless networks convergence
In this thesis the state of the art for IP networks and the two most predominant wireless access networks, UMTS and Wireless LANs, has been reviewed with respect to the enhancement...
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Exchanging the data packets seems as very challenging task due to exponential growth in network interface. Meanwhile, this increased interface makes use of next generation of inter...
I6-FPS: Automating the ICMPv6 Filtering Rules
I6-FPS: Automating the ICMPv6 Filtering Rules
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively fi...
Secure Communication with RFID tags in the Internet of Things
Secure Communication with RFID tags in the Internet of Things
ABSTRACTThe functional capabilities of radio‐frequency identification (RFID) tags are rapidly increasing. Therefore, they can no longer be treated as pure bar‐code substitute, but ...
An information security analysis method of Internet of things based on balanced double SVM
An information security analysis method of Internet of things based on balanced double SVM
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems e...

