ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication over IEEE 802.15.4 LoWPAN radio links requires high end-to-end security rules. The IEEE 802.15.4 MAC layer implements several security features offering hardware hop-by-hop protection for exchanged frames. In order to provide end-to-end security, researchers focus on lightweighting variants of existing security solutions such as IPSec that operates on the network layer. In this paper, we introduce a new security protocol referred to as ”6LowPSec”, providing a propitious end-to-end security solution but functioning at the adaptation layer. 6LowPSec employs existing hardware security features specified by the MAC security sublayer. A detailed campaign is presented that evaluates the performances of 6LowPSec compared with the lightweight IPSec. Results prove the feasibility of an end-to-end hardware security solution for IoT, that operates at the adaptation layer, without incurring much overhead.
6. Conclusion
We have introduced 6LowPSec, a novel end-to-end security protocol for 6LoWPAN, which operates at the adaptation layer. 860 6LowPSec alleviates the need for upper layer security mechanisms and allows hardware implementation of end-to-end security. The proposed solution has been implemented and tested through Contiki operating system. It has proven its efficiency compared with upper layer security solutions such lightweight 865 IPSec. Thus, we can confirm that 6LowPSec behaves quite well with respect to latency and memory footprint. The impact of the security solution into the global system is acceptable while assuming the presence of favorable conditions such as meshunder routing (LOADng) and existing security features of the 870 MAC IEEE 802.15.4 layer. As future work, we need to propose the hardware deployment of our solution on real sensor devices. Furthermore, it is envisaged to evolve our key management proposition.