4,959 research outputs found
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things,
which follow ISO and EPC standards. In addition, ISO standard constitutes the
main layers of supply chain, and many RFID systems benefit from ISO standard
for different purposes. In this paper, we tried to introduce addressing systems
based on ISO standards, through which the range of things connected to the
Internet of Things will grow. Our proposed methods are addressing methods which
can be applied to both ISO and EPC standards. The proposed methods are simple,
hierarchical, and low cost implementation. In addition, the presented methods
enhance interoperability among RFIDs, and also enjoys a high scalability, since
it well covers all of EPC schemes and ISO supply chain standards. Further, by
benefiting from a new algorithm for long EPCs known as selection algorithm,
they can significantly facilitate and accelerate the operation of address
mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217
A New Hybrid Method of IPv6 Addressing in the Internet of Things
Humans have always been seeking greater control over their surrounding
objects. Today, with the help of Internet of Things (IoT), we can fulfill this
goal. In order for objects to be connected to the internet, they should have an
address, so that they can be detected and tracked. Since the number of these
objects are very large and never stop growing, addressing space should be used,
which can respond to this number of objects. In this regard, the best option is
IPv6. Addressing has different methods, the most important of which are
introduced in this paper. The method presented in this paper is a hybrid
addressing method which uses EPC and ONS IP. The method proposed in this paper
provides a unique and hierarchical IPv6 address for each object. This method is
simple and does not require additional hardware for implantation. Further, the
addressing time of this method is short while its scalability is high, and is
compatible with different EPC standards
Entropy/IP: Uncovering Structure in IPv6 Addresses
In this paper, we introduce Entropy/IP: a system that discovers Internet
address structure based on analyses of a subset of IPv6 addresses known to be
active, i.e., training data, gleaned by readily available passive and active
means. The system is completely automated and employs a combination of
information-theoretic and machine learning techniques to probabilistically
model IPv6 addresses. We present results showing that our system is effective
in exposing structural characteristics of portions of the IPv6 Internet address
space populated by active client, service, and router addresses.
In addition to visualizing the address structure for exploration, the system
uses its models to generate candidate target addresses for scanning. For each
of 15 evaluated datasets, we train on 1K addresses and generate 1M candidates
for scanning. We achieve some success in 14 datasets, finding up to 40% of the
generated addresses to be active. In 11 of these datasets, we find active
network identifiers (e.g., /64 prefixes or `subnets') not seen in training.
Thus, we provide the first evidence that it is practical to discover subnets
and hosts by scanning probabilistically selected areas of the IPv6 address
space not known to contain active hosts a priori.Comment: Paper presented at the ACM IMC 2016 in Santa Monica, USA
(https://dl.acm.org/citation.cfm?id=2987445). Live Demo site available at
http://www.entropy-ip.com
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
IETF standardization in the field of the Internet of Things (IoT): a survey
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities
- …