The IPv4 address space is exhausted. The regional Internet registries are now only handing out IPv6 addresses. But, how does IPv6 enable access to the 20+ billion devices that are estimated to be in the IoT by the year 2020? And, since IPv4 isn't going away any time soon, how do we make IPv6 work side by side with IPv4? In this paper, we will describe IPv6 addressing and its operation. Additionally, we will show techniques for writing one application that can support both IPv4 and IPv6 protocols simultaneously.
As the Internet of Things hype train continues to gather steam, there are a number of solution platforms that are vying for mindshare. Both the commercial and industrial/medical IoT are rich with different offerings. Some of them are open, and some are totally proprietary. In this paper, we will try to highlight the different dimensions of many of these platforms so the reader can make an informed decision as to which platform may be best for their applications.
The headlong rush by manufacturers to make everything connected is increasing the number of cyber targets dramatically. Unfortunately, many consumers are totally unaware of how vulnerable all of their connected technology devices make them. In this paper, we will try to highlight the nature of the IoT and what we should be doing to close up the security holes before computer network operations can take devices over.
With the headlong rush to move everything into the cloud, there are some cases where this may be counterproductive. In the case of distributed sensor networks, getting the data into the cloud has several hurdles. The connectivity of the sensors is a significant challenge if all of them must transfer data to remote, cloud-based servers. And, if the sensors can see the Internet, then the Internet can see them. In this paper, we will discuss an alternative connectivity model known as the Fog model. We will compare and contrast the cloud-centric versus fog-centric models across several dimensions including latency, jitter, cost of connectivity and most importantly, security.
With tens of billions of devices slated for deployment as devices in the so-called Internet of Things (IoT), there will be a significant cybersecurity component. Confidentiality, integrity and availability comprise the CIA of cybersecurity and are the major focus of INFOSEC specialists. In this paper, we will outline the use of digital certificates as a means of providing availability/authentication services in the IoT while providing for secure object code update services.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.