• Login
  • Register
  • Search

Based on the Data transmission security of Internet of Things IPv6

Zhenfeng Li, Lijie Gao

Abstract


With the rise and development of new technology of Internet of things, the demand of new intelligent terminal to access the Internet is increasing day by day, and the interconnection of all things is an inevitable trend. The traditional IP protocol in the past can not meet the requirements of "wide access, high-speed interconnection, safe transmission ", but the IPv4(Internet Protocol Version 4) protocol itself has security defects. Traditional Internet is based on IPv4 protocol, the protocol design at the beginning of more consideration of efficiency, security considerations are inadequate, such as IP deception, source routing attacks, network listening and other issues. Therefore IPv6(Internet Protocol Version 6) protocols emerge as the times require, and the application of Internet of things based on IPv6 is becoming more and more common, and then the problems of data transmission security, equipment control security and data exchange security are becoming more and more prominent.Compared with the IPv4, IPv6 did make great progress, mainly in: service quality, security, address capacity and mobility. For the Internet of things technology, IPv6’s progress is of great significance. Based on the data transmission security of IPv6 Internet of things is discussed in this paper, and the countermeasures are put forward to solve the problems of data transmission security of Internet of things .

Keywords


IPv6; Internet of Things (IOT); data transmission; data security; inquiry strategies

Full Text:

PDF

Included Database


References


[1] Wang Y, Xu Q.Research on privacy data security for Internet of Things. Computer Programming Skills and Maintenance 2017; (24): 90-91+94.

[2] Lu L. Research on privacy data security in Internet of Things. Modern Computer (Professional Edition) 2017; (10): 60-64.

[3] Bai Y. Research on privacy data security for Internet of Things [dissertation]. Tianjin University of Technology; 2015.

[4] Tian h, Liu J, Cao L. Based on theimplementation of IPv6-IPsec network security access. Microcomputer information 2008; 2-3: 95-96.

[5] Chen W, Long X, Gao X. Amixed authentication method for mobile IPV6. Journal of Software 2005; 16(91): 1617-1624.

[6] Lin H, Zhang S, Zhang H. Based on IPv6 intrusion detection system current.Television technology 2005; (10): 89-94.

[7] Feng D.Computernetwork and communication security (2nd Edition). Beijing: Tsinghua University Society; 2001.

[8] Du G, Qiu Y, Guo H.IPv6 network security architecture research. Microcomputers Machine Information 2006; (4-3): 82-84.




DOI: http://dx.doi.org/10.18686/ahe.v4i5.2239

Refbacks