Explore chapters and articles related to this topic
IoT New Business Models and the Digital Transformation of the Telecom Industry
Published in Vincent Sabourin, Jordan Tito Jabo, IoT Benefits and Growth Opportunities for the Telecom Industry, 2023
Vincent Sabourin, Jordan Tito Jabo
With IPv4 exhaustion back in 2011 (Richter et al., 2015), IoT development was likely impacted due to the high number of IP addresses needed to connect billions of objects to the network. On the contrary, IPv6 makes the new conception of extending the Internet to consumer devices, physical systems, and any imaginable thing that can benefit from the connectivity. IPv6 spreads the addressing space to support all the emerging Internet-enabled devices. In addition, IPv6 has been designed to provide secure communications to users and mobility for all devices attached to the user; thereby, users can always be connected (Vermesan and Friess, 2014). In parallel to IPv6, several IPv6-related standards have emerged, including, among others, the IPv6 over Low Power WPAN (6LoWPAN), providing a lighter version of IPv6 for constrained nodes and networks (Kushalnagar et al., 2007).
Overview of Internet of Things
Published in Sandeep Misra, Chandana Roy, Anandarup Mukherjee, Introduction to Industrial Internet of Things and Industry 4.0, 2021
Sandeep Misra, Chandana Roy, Anandarup Mukherjee
IPv6: IPv6 is the successive version of Internet Protocol version 4 (IPv4), which deals with addressing over IP-based networks. The exponential growth of the Internet due to technological advances has saturated the existing address space [14]. IPv6 fulfills these shortcomings of IPv4. The features of IPv6 are as follows: It provides a larger address space.The header is represented in a simplified format.Every system has a unique identification code, enabling the implementation of end-to-end connectivity.The host devices can be auto-configured.Routing is faster because the unnecessary information is placed at the end of the header.
Routing and Addressing
Published in Rui Valadas, OSPF and IS-IS, 2019
Address representationFigure 1.4 illustrates the address representation used in IPv4 and IPv6. IPv4 addresses are represented in dotted-decimal notation, i.e. using four decimal numbers separated by a dot, where each number corresponds to the decimal value of one octet, e.g. 128.10.2.30. Due to their length, IPv6 addresses are represented in hexadecimal notation, with 16-bit blocks separated by a colon, e.g. 2001:0db8:000d:000a:0000:0000:0000:0003. Several simplifications can be adopted to shorten the address representation, e.g. skip leading zeros in a 16-bit block and replace one group of consecutive zeros by a double colon. With these two simplifications, the previous IPv6 address would be represented as 2001:db8:d:a::3 (see Chapter 3 of [14] for additional discussion).
ICMPv6-based DDoS Flooding-Attack Detection Using Machine and Deep Learning Techniques
Published in IETE Journal of Research, 2023
Ali El Ksimi, Cherkaoui Leghris, Samira Lafraxo, Vinod Kumar Verma
IPv6 (Internet Protocol version 6) is a connectionless network protocol used for assigning IP addresses to computers. The successor of IPv4 officially reached saturation in 2011, IPv6 offers 128-bit addresses (against 32 bits for the previous version) and thus offers a larger address space. These addresses take the form of hexadecimal writing with 8 groups of 2 bytes. On the other hand, IPv6 brings greater security. Authentication and confidentiality are the major security features of the IPv6 protocol. ICMP for IPv6 (Internet Control Message Protocol Version 6) is an integral part of the IPv6 architecture and must be fully supported by all implementations of IPv6. ICMPv6 combines functions previously subdivided across different protocols, such as ICMP v4 (Internet Control Message Protocol version 4), IGMP (Internet Group Membership Protocol), and ARP (Address Resolution Protocol), and it introduces some simplifications by eliminating type's obsolete messages that are no longer used.
Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network
Published in IETE Journal of Research, 2021
Abolfazl Mehbodniya, Julian L. Webber, Mohammad Shabaz, Hamidreza Mohafez, Kusum Yadav
In its simplest form, IoT can be expressed as the communication of heterogeneous objects with each other in a network topology. Since IoT objects (mobile devices) are electronic-based objects, they have limited processor, memory and energy resources (battery, etc.) necessary for their operation. Moreover, they operate in a wide range of usage areas, such as receiving, analyzing, sharing, and storing data in the external environment. With the increase in usage areas soon, IPv6 addresses will be used instead of IPv4 addresses, which will be insufficient for IoT devices, which will reach 50 billion. For this reason, it is necessary to use 6LoWPAN [15–19] IPv6 addresses in low-energy wireless personal area networks for these resource-constrained objects. This adaptation layer, located between the Media Access Control (MAC) and the network layer, is given in Figure 6. 6LoWPAN has an essential place between the RPL routing protocol, which is also the basis of the study, and the data link layer. The most important feature is that it can simultaneously communicate with more than one object by the IEEE 802.15.4 [16,20–23] standard, with less processing power, memory usage, and complexity calculation.
A Stateless Spatial IPv6 Address Configuration Scheme for Internet of Things
Published in IETE Journal of Research, 2021
SLAAC is simple, dynamic, and scalable and provides a way for IoT nodes to self-configure IPv6 addresses [16]. The IPv6 address is represented by a 128 bit fixed size numerical value and is generally divided into two parts; the leftmost 64 bit prefix and the rightmost 64 bit Interface Identifier (IID) [17]. The number of bits in the prefix and IID can vary depending on the link type and deployment scenario of the IoT node. An IoT node creates a 128-bit IPv6 address by combining the prefix and IID. The first part prefix is extracted from the network router’s router advertisement (RA) message and in the second part, the IID is generated by the node itself using any addressing scheme. The uniqueness of a generated address is verified using the duplicate address detection (DAD) protocol. A verified unique IPv6 address is assigned to the new node’s interface. If a duplicate address is found during the DAD process, a second IID is generated and the entire process is repeated, leading to delays and energy consumption [18,19].