IPV6 Address Configuration Method in 6LoWPAN Oriented to the Internet of Power Things

Author(s):  
Lu Xu ◽  
Li Jianwei ◽  
Jiang Hao ◽  
Luo Dan ◽  
Cao Han
Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


2013 ◽  
Vol 760-762 ◽  
pp. 1936-1941
Author(s):  
Guo Fang Kuang ◽  
Chun Lin Kuang

IPv6 has huge address space, while 128 bit IPv6 address is divided into two parts, namely the address prefix and the interface address. IPv6 provides a wide range of security policies for Internet of Things safety system. The security of the Internet of Things applications interface IPv6 address can be used to identify the node. This paper proposes construction security architecture of the Internet of Things based on IPv6 technology. In the allocation of the state address safety issues and mobile IPv6 binding buffer security update issues, are able to meet the security needs of the Internet of Things.


Respati ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 1
Author(s):  
Lukman Lukman ◽  
Wahyu Adi Pratomo

INTISARIMengakses internet adalah kegiatan yang tidak lepas dari kebutuhan masyarakat setiap hari pada saat ini. Hal tersebut dapat dilihat dari banyaknya kegiatan yang menggunakan akses internet sebagai sumber informasi dan sebagai lalu lintas data antara satu perangkat ke perangkat lainnya. Seiring berjalannya waktu semakin banyak perangkat yang membutuhkan akses internet untuk identifikasi dan definisi lokasi. Namun apakah alamat ip yang tersedia pada saat ini dapat mencukupi kebutuhan alamat ip yang semakin lama semakin bertambah akibat banyaknya perangkat yang membutuhkan alamat ip untuk mengakses internet. Jika dilihat di masa yang akan datang IPv4 yang sekarang masih kita gunakan tidak akan mencukupi kebutuhan alamat ip oleh perangkat yang digunakan. Oleh karena itu perpindahan untuk mulai menggunakan IPv6 sangatlah penting karena alamat ip IPv6 yang dihitung hampir tak terbatas dapat mencukupi kebutuhan alamat ip untuk digunakan oleh banyak perangkat. Untuk mengatasi permasalahan transisi dari IPv4 ke IPv6, Hurricane Electric ada dengan keunggulan seperti menyediakan IPv6 untuk pengguna, tanpa dipungut biaya, serta memberikan materi dan konfigurasi yang dapat digunakan oleh pengguna untuk melakukan proses transisi. Dalam proses transisi IPv4 ke IPv6 mekanisme transisi yang digunakan adalah menggunakan Tunneling, yang secara tidak langsung juga menggunakan Dual Stack karena IPv6 akan diterapkan kedalam Jaringan IPv4 yang sudah ada. Mikrotik router digunakan sebagai penghubung antara klien ke Tunnel Server dan pendelegasi IPv6 yang didapatkan dari Tunnel.Dengan pengimplementasian IPv6 ini didapatkan Hurricane Electric akan menyediakan alamat IPv6 yang bisa digunakan oleh pengguna untuk melakukan transisi Tunneling pada infrastruktur Jaringan IPv4 dan menghubungkan ke Jaringan IPv6 di internet, diharapkan banyak orang dan instasi yang akan mengerti dan memahami penggunaan dari IPv6 secara keseluruhan. Selain itu diharapkan penggunaan IPv6 juga semakin meningkat untuk menggantikan IPv4 yang sudah mulai kehabisan alamat ip untuk digunakan.Kata kunci: IPv4, IPv6, Transisi, Tunnel Broker, Hurricane Electric, Mikrotik.  ABSTRACTAccessing the internet is an activity that can not be separated from the needs of the community every day at this time. This can be seen from the many activities that use internet access as a source of information and as data traffic between one device to another. Over time more and more devices need internet access for location identification and definition. But whether the available IP address at this time can meet the need for an IP address that is increasingly growing due to the number of devices that require an IP address to access the internet. When viewed in the future, the IPv4 that we still use today will not meet the needs of the IP address of the device being used. Therefore the move to start using IPv6 is very important because the IPv6 IP address that is counted is almost unlimited can meet the needs of the IP address to be used by many devices.To overcome the problem of the transition from IPv4 to IPv6, Hurricane Electric comes with advantages such as providing IPv6 to users, free of charge, as well as providing material and configuration that can be used by users to make the transition process. In the process of transitioning from IPv4 to IPv6 the transition mechanism used is to use Tunneling, which indirectly also uses Dual Stack because IPv6 will be applied to the existing IPv4 Network. Mikrotik router is used as a liaison between the client to the Tunnel Server and IPv6 delegation obtained from the Tunnel.With the implementation of IPv6, Hurricane Electric will provide an IPv6 address that can be used by users to transition Tunneling on IPv4 Network infrastructure and connect to the IPv6 Network on the internet, it is hoped that many people and institutions will understand and understand the use of IPv6 as a whole. In addition it is expected that the use of IPv6 will also increase to replace IPv4 which has started to run out of ip addresses for use.Keywords: IPv4, IPv6, Transition, Tunnel Broker, Hurricane Electric, Mikrotik.


Author(s):  
Monali Mavani ◽  
Krishna Asawa

: The privacy enabled IPv6 addressing mechanism ensures the privacy of node's identification in the communication messages. It makes adversaries difficult to track nodes and link any activities with the node's IP or the MAC address. Scalability of the privacy enabled IPv6 addressing scheme for 6LoWPAN may be affected due to underlying MAC layer mechanisms. Hence, this study aims to explore such impact. Addressing scheme is implemented in Contiki operating system which uses duty cycling at the MAC layer along with CSMA channel access mechanism. ContikiMAC and CXMAC are widely used duty cycling protocols in Contiki. An analytical study is presented in this paper, which analyses the IPv6 address configuration delay with ContikiMAC and CXMAC. Simulation is performed to corroborate the presented analytical model. The address configuration latency limits the scalability of the network. Hence, this paper studies the impact of duty cycling of the nodes on the address configuration latency and estimates the size of a single hop PAN. It is observed that ContikiMAC duty cycling protocol can achieve better performance compared to CXMAC protocol in terms of address configuration latency. In order to make up for the delay due to duty cycling, network can be divided into multiple PANs of smaller size where addressing process runs simultaneously.


2015 ◽  
Vol 24 (2) ◽  
pp. 257-284 ◽  
Author(s):  
Xiaonan Wang ◽  
Deguang Le ◽  
Hongbin Cheng

Sign in / Sign up

Export Citation Format

Share Document