6lo Technology for Smart Cities Development: Security Case Study
Author(s) -
Anass Rghioui,
Anass Khannous,
Said Bouchkaren,
Mohammed Bouhorma
Publication year - 2014
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/16089-5402
Subject(s) - computer science , development (topology) , computer security , smart city , internet of things , mathematical analysis , mathematics
Excessive demand and the urgent need for the development of smart cities, evoke the need to provide the capacity for more low-resource devices to communicate and collaborate at a distance, in order to make the concept of the internet more real and practical. For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet. From the security point of view, this integration is not without risks, the Internet carries many dangers and current security mechanisms are very greedy for such devices. This paper analyses potential security threats in 6lo as a particular case of mobile ad hoc networks, and provides some countermeasures ideas, in particular, the two principal security defense lines: the cryptography as a first line and the intrusion detection system as the second line. General Terms Internet, IPv6, Cryptography, IDS, Security.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom