Explore chapters and articles related to this topic
Security Challenges and Mitigation Approaches for Smart Cities
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
S. Ponmaniraj, Tapas Kumar, V. Gokul Rajan, Sanjay Sharma
Denial of Services (DoS) is one of the attacking methods in which the hacker used to send the continuous requests to the server and made the server inactive by means of acquiring its entire processing and power resources. Due to this unconditional flow of an infinite number of requests the targeted server won’t be able to respond properly. Passing continuous request from various places to the targeted systems in order to make it busy or not to respond for a while is known as Distributed Denial of Service (DDoS). In a low-power communication networks, devices are in failure mode when the power goes off. In that particular moment, devices are unable to receive or respond to the requests and this circumstance leads to DoS so that target operations will not be available at the requested time. When requests are in the waiting queue, hackers can easily access information in this time duration. If devices are unable to receive packets, rerouting ispossible by the cybercriminal when packets are in queue with meaningful information. Host identity protocol (HIP) is used to avoid DoS or DDoS on smart device networks. The basis of IP addresses and DNS, HIP separates the end-to-end identifier and locator roles of a given IP address. It introduces the host identity (HI) name space in the public key management system to maintain authenticity of source and destination places.
Information-Centric Networking Future Internet Video Delivery
Published in M. Bala Krishna, User-Centric and Information-Centric Networking and Services, 2019
Jordi Ortiz, Pedro Martinez-Julia, Antonio Skarmeta
The HIP introduces cryptographic host identifiers forming a new global name space as a new intermediate layer between the IP and transport layers. It decouples the endpoint identifier and locator, enabling the transport on host identifiers and routing on IP addressing that serve as pure locators. Although this seems a good solution, it presents many problems because of the intrinsic meaning of identifiers and, in general, its weak solution to all requested capabilities for the Future Internet.
IPv6 network virtualization architecture for smooth IPv6 transition
Published in Amir Hussain, Mirjana Ivanovic, Electronics, Communications and Networks IV, 2015
Dujuan Gu, Xiaohan Liu, Ze Luo, Baoping Yan
Nikander, P., Gurtov, A. & Henderson, T. R. 2010. Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. Communications Surveys & Tutorials, IEEE 12: 186-204.
Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
Published in Enterprise Information Systems, 2021
Subodh Mendhurwar, Rajhans Mishra
Roman, Zhou and Lopez (2013) have outlined various types of IoT architectures like Centralised IoT, Collaborative IoT, Connected Intranets of Things and Distributed IoT. Recommended Security Architecture of IoT Application and Middleware Layer includes – Federated Identity Management, Encryption Mechanisms, Firewalls, Risk Assessment and Intrusion Detection (Farooq et al. 2015). Heer et al. (2011) while weighing the pros and cons of centralised versus distributed IoT architectures, discussed suitability of protocols like – Internet Key Exchange (IKEv2)/IPsec, Host Identity Protocol (HIP), Datagram-oriented Transport Layer Security (DTLS), Extensible Authentication Protocol (EAP), Protocol for Carrying Authentication for Network Access (PANA) as candidate solutions for 6LoWPAN; observing that since resource constraints hinder securing each individual OSI layer, cross-layer concepts should be considered for an IoT-driven redesign of Internet security protocols.