CFP last date
20 May 2024
Reseach Article

6lo Technology for Smart Cities Development: Security Case Study

by Anass Rghioui, Anass Khannous, Said Bouchkaren, Mohammed Bouhorma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 15
Year of Publication: 2014
Authors: Anass Rghioui, Anass Khannous, Said Bouchkaren, Mohammed Bouhorma
10.5120/16089-5402

Anass Rghioui, Anass Khannous, Said Bouchkaren, Mohammed Bouhorma . 6lo Technology for Smart Cities Development: Security Case Study. International Journal of Computer Applications. 92, 15 ( April 2014), 54-59. DOI=10.5120/16089-5402

@article{ 10.5120/16089-5402,
author = { Anass Rghioui, Anass Khannous, Said Bouchkaren, Mohammed Bouhorma },
title = { 6lo Technology for Smart Cities Development: Security Case Study },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 15 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 54-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number15/16089-5402/ },
doi = { 10.5120/16089-5402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:26.491552+05:30
%A Anass Rghioui
%A Anass Khannous
%A Said Bouchkaren
%A Mohammed Bouhorma
%T 6lo Technology for Smart Cities Development: Security Case Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 15
%P 54-59
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Excessive demand and the urgent need for the development of smart cities, evoke the need to provide the capacity for more low-resource devices to communicate and collaborate at a distance, in order to make the concept of the internet more real and practical. For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet. From the security point of view, this integration is not without risks, the Internet carries many dangers and current security mechanisms are very greedy for such devices. This paper analyses potential security threats in 6lo as a particular case of mobile ad hoc networks, and provides some countermeasures ideas, in particular, the two principal security defense lines: the cryptography as a first line and the intrusion detection system as the second line.

References
  1. K. Su, J. Li, and H. Fu, "Smart city and the applications," in 2011 International Conference on Electronics, Communications and Control (ICECC), 2011, pp. 1028–1031.
  2. N. Kushalnagar, G. Montenegro, D. E. Culler, and J. W. Hui, "Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks. " [Online]. Available: http://tools. ietf. org/html/rfc4944.
  3. C. P. P. Schumacher, N. Kushalnagar, and G. Montenegro, "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. " [Online]. Available: https://tools. ietf. org/html/rfc4919.
  4. L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw. , vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
  5. G. J. Pottie, "Wireless sensor networks," in Information Theory Workshop, 1998, 1998, pp. 139–140.
  6. D. Kyriazis, T. Varvarigou, A. Rossi, D. White, and J. Cooper, "Sustainable smart city IoT applications: Heat and electricity management amp; Eco-conscious cruise control for public transportation," in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a, 2013, pp. 1–5.
  7. J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, and B. Heile, "IEEE 802. 15. 4: a developing standard for low-power low-cost wireless personal area networks," IEEE Netw. , vol. 15, no. 5, pp. 12–19, Sep. 2001.
  8. T. Narten, S. Thomson, and T. Jinmei, "IPv6 Stateless Address Autoconfiguration. " [Online]. Available: http://tools. ietf. org/html/rfc4862.
  9. T. Narten, W. A. Simpson, E. Nordmark, and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6). " [Online]. Available: https://tools. ietf. org/html/rfc4861.
  10. S. Chakrabarti, Z. Shelby, and E. Nordmark, "Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). " [Online]. Available: http://tools. ietf. org/html/rfc6775.
Index Terms

Computer Science
Information Sciences

Keywords

Smart cities 6lo 6LoWPAN Internet of Things Network Security.