首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Gao  Lijun  Zhang  Lu  Feng  Lin  Ma  Maode 《Wireless Personal Communications》2020,115(2):1603-1621

Machine-to-machine (M2M) is an important part of Internet of Things (IoT), and is used to describe those technologies applied in wireless communication automatically between mechanics or electronics instruments. With the rapid development and wide application of the Internet of Things, IETF is assigned to design IPv6 over low power wireless personal area network (6LoWPAN). The address of IPv6 is indefinite, which means it can satisfy addressing requirements for M2M. The 6LoWPAN standard has clarified important issues in M2M, but communication security has not been effectively resolved. In this article, we analyzed the existing security protocol for M2M communication in 6LoWPAN. The analysis result shows that the protocol has the defect of data leakage after the node is captured. In addition, the EAKES6Lo protocol is also vulnerable to sinkhole attacks and plaintext-chosen attacks. Based on the above analysis, an M2M communication mutual authentication protocol based on 6LoWPAN in unattended operation is proposed. The protocol establishes a reasonable secret key distribution mechanism and designs an anti-capture attack detection method for unattended nodes to resist attacks, such as replay attacks, sinkhole attacks, plaintext-chosen attacks, and physical capture attacks. Finally, the security of the protocol is proved by BAN.

  相似文献   

2.
随着互联网的发展和物联网技术的兴起,新兴的6Lo WPAN技术融合了无线传感网络(WSN)和IPv6技术,为建设智慧城市迎来了新的机遇。本系统利用Android智能手机通过互联网和边界路由器远程监测和控制WSN。其中,各传感器节点移植了Contiki操作系统和IPv6协议,实现了WSN与互联网的信息融合,为城市公共设施的统一管理实现高效、节能的智慧城市提供创新途径,具有广泛的应用前景和实用价值。最后采用LED灯以及温、湿度传感器来模拟城市小区的用电设施,用以展示系统如何工作。  相似文献   

3.

The Internet of Things (IoT) is the next big challenge for the research community where the IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is a key part of the IoT. Recently, the IETF ROLL and 6LoWPAN working groups have developed new IP based protocols for 6LoWPAN networks to alleviate the challenges of connecting low memory, limited processing capability, and constrained power supply sensor nodes to the Internet. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects such as throughput, latency, energy consumption, reliability, and packet delivery. In this paper, we overview the protocol stack of 6LoWPAN networks and summarize a set of its protocols and standards. Also, we review and compare a number of popular congestion control mechanisms in wireless sensor networks (WSNs) and classify them into traffic control, resource control, and hybrid algorithms based on the congestion control strategy used. We present a comparative review of all existing congestion control approaches in 6LoWPAN networks. This paper highlights and discusses the differences between congestion control mechanisms for WSNs and 6LoWPAN networks as well as explaining the suitability and validity of WSN congestion control schemes for 6LoWPAN networks. Finally, this paper gives some potential directions for designing a novel congestion control protocol, which supports the IoT application requirements, in future work.

  相似文献   

4.
张效奎  白恩健 《电子科技》2012,25(12):11-14
在研究6LoWPAN无线传感器网络以及IPv6网络的基础上,提出一种基于6LoWPAN的传感器网关解决方案,实现6LoWPAN无线传感器网络与IPv6网络之间互联,并对网关中的硬件与软件设计进行论述。最后搭建测试网络,通过对端到端网络的连接性、延时变化、往返延时、丢包率以及吞吐量的测试,对该网络性能作出简要分析。测试结果表明,该网关实现了6LoWPAN无线传感器网络与IPv6网络的互联,并能在实际网络环境中运行。  相似文献   

5.
In the area of wireless communication technologies, 6LoWPAN leverages the extensive capabilities of IPv6, even within the constraints imposed by resource-limited devices, particularly within wireless sensor networks (WSNs). The integration of 6LoWPAN into modern solutions for implementing the IPv6-based Internet of Things (IoT) is becoming increasingly important. In this paper, a sensor monitoring and notification system specifically designed for deployment over 6LoWPAN has been proposed. Multipurpose capability, scalability, and ease of deployability are the main features of the proposed system. Its architecture reflects the highest degree of flexibility and allows for a variety of use cases encountered in practical scenarios. In addition, a web interface has been developed as part of the comprehensive system architecture. This interface enables efficient management of the entire system and facilitates connection for new users and seamless integration of additional sensors. By encapsulating complex functions in a user-friendly interface, the system promotes accessibility, convenience, and an enhanced user experience. The proposed system overcomes the limitations of current approaches, thereby creating new opportunities. The flexibility of the proposed system allows it to be applied to various use cases.  相似文献   

6.
基于6LoWPAN的物联网寻址策略研究   总被引:1,自引:0,他引:1  
在6LoWPAN (IPv6 over Low-power Wireless Personal Area Network)的基础上,该文提出应用于物联网的寻址策略,实现基于IEEE 802.15.4协议的底层异构网络与互联网的实时通信。寻址策略包括IPv6地址自动配置和报头压缩。采用的分层地址自动配置策略,首先在底层网络内部允许节点使用16位短地址导出的链路本地地址进行数据分组传输,该链路本地地址需通过执行基于分簇的重复地址检测机制保证唯一性;其次,每个底层网络中的Sink节点通过上层IP路由器获取全球路由前缀,并与接口标识符相结合,形成Sink节点的全球地址,实现底层网络与互联网的数据交换。同时,通过在报头压缩编码中植入链路本地地址和全球地址控制位,提出了一种适用于物联网应用的报头压缩方案IIPHC (IoTs IPv6 Header Compression)。如果地址类型为链路本地地址,则采用简单灵活的IIPHC1方案,如果地址类型为全球地址,则采用相对复杂但有效的IIPHC2方案。仿真及测试结果表明,基于6LoWPAN的物联网寻址策略在网络开销、时延、吞吐量、能耗等性能方面存在一定的优越性。  相似文献   

7.
IPV6和物联网     
由于互联网IPv4地址即将用尽,IPv6协议被越来越多的互联网专家和研究者看成是下一代互联网的基础协议。与IPv4相比。IPv6具备了更大的地址空间、更好的可扩展性、更高效的网络传输、更好的安全管理架构和更好的移动支持。除了对传统互联网的网络容量和性能的升级。IPv6在物联网的路由、寻址以及物联网应用基础协议设计之初就提供了很好的支持。本文一方面将从IPv6的基本概念入手,阐述与IPv4的区别,并介绍IPv6在中国的发展;另一方面通过对物联网需求的分析,着重介绍IPv6关键技术在物联网的应用,如6LoWPAN,RPL和CoAP协议,以及IPv6在IETF相关工作组的活动。  相似文献   

8.
The Network Mobility (NEMO) and IPv6 over Low power WPAN (6LoWPAN) protocols are the two most important technologies in current networking research and are vital for the future ubiquitous environment. In this paper, we propose a compressed packet header format to support the mobility of 6LoWPAN. Also, a Lightweight NEMO protocol is proposed to minimize the signaling overhead between 6LoWPAN mobile routers and 6LoWPAN gateways by using a compressed mobility header. Performance results show that our Lightweight NEMO protocol can minimize total signaling costs and handoff signaling delay.  相似文献   

9.
马磊  孙懋珩 《通信技术》2012,(11):47-50
6LoWPAN标准将下一代互联网协议IPv6与IEEE 802.15.4标准联系起来,使得无线传感器网络与IPv6网络的连接通信成为可能。目前的6LoWPAN标准中没有与移动性相关的规定,但是在许多应用情境中往往需要传感器终端进行移动,所以无线传感器网络的移动性管理越来越重要。因此这里提出一种基于PMIPv6的移动管理策略,通过仿真分析可以发现与较传统的MIPv6移动管理方案相比基于代理的方案可以有效降低切换时延。  相似文献   

10.

Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors at network layer are prominent errors in IoT which degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through the network layer of the IoT. This paper has an emphasis on the detection of a wormhole attack because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack is the most disruptive attack out of all the other attacks mentioned above. The wormhole attack inserts information on incorrect routes in the network; it also alters the network information by causing a failure of location-dependent protocols thus defeating the purpose of routing algorithms. This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects a wormhole attack and the attacker nodes. The presence of a wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and the hop-count. The proposed system is energy efficient hence it is beneficial for a resource-constrained environment of IoT. It also provides precise true-positive (TPR) and false-positive detection rate (FPR).

  相似文献   

11.
Technology has revolutionized medical practices by enabling more convenient and non‐intrusive monitoring of patient's health, leading to next generation ubiquitous healthcare (u‐healthcare). The exploitation of the Internet protocol version 6 addressing space along with the miniaturization of electronic devices has fostered providing interoperability and connectivity of wearable sensor devices in wireless body area networks to the Internet of Things. In this paper, we propose to integrate the IPv6 over low power wireless personal area network (6LoWPAN) to the u‐healthcare monitoring system architecture. The main objective is to study the feasibility of the 6LoWPAN‐enabled platform in real‐world scenarios dealing with medical data. The performance evaluation of this platform is carried out initially through simulations using OMNet++ and then supported by an experimental study using sensor motes and a customized micro‐computing unit. Performance metrics such as throughput, end‐to‐end delay, packet error rate, and energy consumption are investigated under acute health conditions, where patient's health information has to be sent continuously and at maximum rate to the care provider. The obtained results show that the proposed 6LoWPAN solution fulfills the main quality of service requirements of u‐healthcare applications. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

12.
IPv6是互联网发展的必然趋势,所有互联网应用均将陆续迁往IPv6。文章阐述互联网产品在IPv6中将遇到的挑战和机遇,简要介绍现阶段业界较通行的解决方案并对互联网应用向IPv6的演进提出建议策略。  相似文献   

13.
无线传感器网络节点的资源非常有限,如果能够对IPv6报头进行压缩可以在较大程度上减小数据传输量,提高IPv6传感器网络的整体性能。通过对6LoWPAN报头压缩方案的研究,并结合无线传感器网络的特点和实际需求,在已有无线传感器网络底层协议和基本IPv6协议栈基础上,设计并实现了一种支持对跳数限制压缩的IPv6报头压缩方法。实验结果表明,报头压缩可以有效节省网络能耗,降低丢包率,减小数据传输时延。  相似文献   

14.
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to use location to find the source of attacks. In performing DDoS and false data injection attacks, he takes advantage of diversifying the attack paths with mobile malicious nodes to prevent network-level defenses. For attacks that disrupt or undermine network protocols like routing and clustering, moving the misbehaving nodes prevents them from being easily identified and blocked. Thus, mobile malicious node attacks are very dangerous and need to be detected as soon as possible to minimize the damage they can cause. In this paper, we are the first to identify the problem of mobile malicious node attacks, and we describe the limitations of various naive measures that might be used to stop them. To overcome these limitations, we propose a scheme for distributed detection of mobile malicious node attacks in static sensor networks. The key idea of this scheme is to apply sequential hypothesis testing to discover nodes that are silent for unusually many time periods—such nodes are likely to be moving—and block them from communicating. By performing all detection and blocking locally, we keep energy consumption overhead to a minimum and keep the cost of false positives low. Through analysis and simulation, we show that our proposed scheme achieves fast, effective, and robust mobile malicious node detection capability with reasonable overhead.  相似文献   

15.
Internet of Things with the use of sensors has opened a huge window for applications in almost every area of life and its penetration is endless with wireless connectivity. It is resulting in communication among sensor nodes connected in a low power wireless personal area network (LoWPAN). This requires transmission of IPv6 packets over Low-power wireless personal area network and is called 6LoWPAN. The frame size of 802.15.4 (IEEE standard for wireless network) is only of 127 bytes. The large sized headers like link layer header, security bits, IPv6 header, and UDP header consume most of the packet space leaving only 28 bytes for actual payload. Hence to provide a substantial number of bytes for the payload, header compression becomes a necessity in 6LoWPAN. Header compression also leads to smaller packet size which in turn will consume less bandwidth and power. 6LoWPAN is a resource constraint environment in which such a thing is desirable. Hence IPv6 header compression is 6LoWPAN not only provides more space for data payload but it also consumes less power, bandwidth and results in lesser delays. This paper proposes “Modified and Improved IPv6 Header Compression” (MIHC), a compression technique for IPv6 header in 6LoWPAN environment. The compression mechanism is based on correlation of headers present in the packets which are being transmitted from a source node to destination. We have implemented it in Contiki 3.0 and simulated using Cooja simulator. Results shows that the proposed mechanism MIHC outperforms IPHC and NO_COMP with 20 and 76% higher throughput, 13 and 38% lesser delay, 12 and 37% less round trip time and 13 and 39% reduced packet size respectively. Application of T test on measured values shows a significant difference (p?<?0.5) between No header compression case i.e. NO_COMP and our proposed algorithm i.e. MIHC.  相似文献   

16.
Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health‐care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge‐based IoT environment has several security and privacy issues similar to those for the cloud‐based IoT environment. Various types of attacks, such as “replay, man‐in‐the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge‐based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge‐based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end‐to‐end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge‐based IoT environment called as RAD‐EI. We simulate RAD‐EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD‐EI to prove its resilience against routing attacks. RAD‐EI accomplishes around 95.0% “detection rate” and 1.23% “false positive rate” that are notably better than other related existing schemes. In addition, RAD‐EI is efficient in terms of computation and communication costs. As a result, RAD‐EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.  相似文献   

17.
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.  相似文献   

18.
IPv6与IEEE802.15.4网络结合的发展现状   总被引:1,自引:0,他引:1  
6LoWPAN技术是将IPv6应用在IEEE802.15.4网络上的一种创新技术。本文分析了6LoWPAN适配层结构和报头压缩、邻居发现两项关键技术,介绍了6LoWPAN标准和产业发展现状。  相似文献   

19.
一种代理移动IPv6认证协议   总被引:3,自引:0,他引:3       下载免费PDF全文
周华春  张宏科  秦雅娟 《电子学报》2008,36(10):1873-1880
代理移动IPv6为移动节点提供了基于网络的移动性管理方法,移动节点不参与管理移动性信令.为了在移动互联网络中应用代理移动IPv6协议,需要定义安全有效的认证协议.目前还没有见到关于代理移动IPv6认证协议方面的研究,本文提出了一种代理移动IPv6的认证协议,该认证协议可以提供接入认证功能,并可防止重放攻击和密钥暴露.为了分析该认证协议的性能,本文给出了认证费用和认证延迟分析的解析模型,分析了移动性和流量参数对认证费用和认证延迟的影响.研究结果表明提出的代理移动IPv6认证协议安全有效.  相似文献   

20.
提出一种基于Contiki操作系统的6LoWPAN无线传感器网络协议栈的实现方案,利用Cooja软件仿真环境对提出的方案进行整体网络模拟。在保证基于6LoWPAN的无线传感器网络和IPv6网络连通性正常的情况下,实现数据报的分片和重组、UDP数据传输、传感数据采集、网络拓扑监视等功能。通过实验验证,该方案具有可行性和合理性,有一定的研究和应用价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号