Javascript must be enabled to continue!
Construction Security Architecture of the Internet of Things Based on IPv6 Technology
View through CrossRef
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address. IPv6 provides a wide range of security policies for Internet of Things safety system. The security of the Internet of Things applications interface IPv6 address can be used to identify the node. This paper proposes construction security architecture of the Internet of Things based on IPv6 technology. In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Title: Construction Security Architecture of the Internet of Things Based on IPv6 Technology
Description:
IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address.
IPv6 provides a wide range of security policies for Internet of Things safety system.
The security of the Internet of Things applications interface IPv6 address can be used to identify the node.
This paper proposes construction security architecture of the Internet of Things based on IPv6 technology.
In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.
Related Results
Mengapa Ipv6 Gagal ?
Mengapa Ipv6 Gagal ?
ABSTRACTIPv6 was introduced to replace IPv4 as the main IP address. However, despite being more than 15 years since itsstandardization, IPv6 failed to achieve any meaningful diffus...
Implementasi Network Monitoring Dengan Ntop Pada Jaringan DualStack
Implementasi Network Monitoring Dengan Ntop Pada Jaringan DualStack
Untukbisa terhubung ke internet, maka dibutuhkan komponen penting dalam jaringan komputer yaitu Internet Protocol (IP). Seiring dengan perkembangan teknologi, IP terbagi menjadi 2 ...
IPv6 implementation strategies: Insights from the telecommunication and finance sectors
IPv6 implementation strategies: Insights from the telecommunication and finance sectors
The transition from IPv4 to IPv6 is a critical evolution in network infrastructure, driven by the exhaustion of IPv4 addresses and the growing demand for enhanced connectivity. Thi...
Introducción a IPv6
Introducción a IPv6
Introducción a IPv6
Introduction to IPv6
Edwin Salazar Vega
Universidad Nacional de Piura
DOI: https://doi.org/10.33017/RevECIPeru2011.0023/
RESUMEN
Como es de conocimiento p...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Novel architectures and strategies for security offloading
Novel architectures and strategies for security offloading
Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects...
Toward All-IP networks : IP and wireless networks convergence
Toward All-IP networks : IP and wireless networks convergence
In this thesis the state of the art for IP networks and the two most predominant wireless access networks, UMTS and Wireless LANs, has been reviewed with respect to the enhancement...

