Security aspects in 6LowPan networks

  • Authors:
  • Ron Barker

  • Affiliations:
  • Vodafone Group R&D

  • Venue:
  • Proceedings of the Conference on Design, Automation and Test in Europe
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

6lowPan devices are intended to be deployed in Ipv6 networks whose subnets that often will be physically disjunct and perhaps separated by large distances. A major advantage of exploiting the nearly inexhaustible address of pool available in IPv6 is the ease with which true host-to-host communication can be realised. This however amplifies the importance of security in the network. It must be warranted with nearly 100% certainty that whenever a sensor node solicits or furnishes data to another node, that the solicited node be in fact that node from which the data is required, and just importantly, that the soliciting node be true node authorised to request the data.