Security threats in life-logging under a smart environment
and the IoT occur mainly because of the lack of suitable
security protocols. Considering smart objects’ limited
capabilities, proper algorithms and techniques need to be
implemented in order to achieve maximum security and
privacy. The IPSO Alliance advocates the use of the IP protocol
for establishing a secure exchange of data. In order to achieve
security in smart objects, the IPv6 over Low power Wireless
Personal Area Networks (6lowPAN) protocol is proposed (Hui
et al., 2009). Smart objects are able to connect throughout
the lightweight 6lowPan protocol which gains its advantage
from the use of AES-128 link-layer security mechanism of IEEE
802.15.4. However, the IP fragmentation allows the use of
available buffer from malicious users to send large or invalid
packets. Even if in the transport layer 6lowPAN is shown to
have efficiency, in the network layer, Internet Protocol Security
(IPsec) and Secure Neighbor Discovery (SEND) appear to be
more suitable to attain network security in IPv6 (Caicedo et al.,
February 2009). Hummen et al. (2011) suggest a security
adaptation layer to overcome security issues when connecting
the IoT network to the Internet. The adaptation layer is based
on one similar to the 6lowPAN concept or IPv6 in which
gateways connected to different domains are able to translate
standard IP security protocols to domain-specific protocols
variants.
Security threats in life-logging under a smart environmentand the IoT occur mainly because of the lack of suitablesecurity protocols. Considering smart objects’ limitedcapabilities, proper algorithms and techniques need to beimplemented in order to achieve maximum security andprivacy. The IPSO Alliance advocates the use of the IP protocolfor establishing a secure exchange of data. In order to achievesecurity in smart objects, the IPv6 over Low power WirelessPersonal Area Networks (6lowPAN) protocol is proposed (Huiet al., 2009). Smart objects are able to connect throughoutthe lightweight 6lowPan protocol which gains its advantagefrom the use of AES-128 link-layer security mechanism of IEEE802.15.4. However, the IP fragmentation allows the use ofavailable buffer from malicious users to send large or invalidpackets. Even if in the transport layer 6lowPAN is shown tohave efficiency, in the network layer, Internet Protocol Security(IPsec) and Secure Neighbor Discovery (SEND) appear to bemore suitable to attain network security in IPv6 (Caicedo et al.,February 2009). Hummen et al. (2011) suggest a securityadaptation layer to overcome security issues when connectingthe IoT network to the Internet. The adaptation layer is basedon one similar to the 6lowPAN concept or IPv6 in whichgateways connected to different domains are able to translatestandard IP security protocols to domain-specific protocolsvariants.
การแปล กรุณารอสักครู่..
