O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19–Utilizing IPv6 Security Features

In this chapter, which follows on from the technical discussion on IPv6 and 6LowPAN we introduce the security features built into the IPv6 protocol and why we should make use of them. Additionally, we will look at TLS (transport layer security) routing and securing the IoT layers through the security tenets of CIA.

What the reader will learn in this chapter:

  1. The built in IPv6 security features
  2. 6LowPAN and where and how it can be deployed
  3. Advantages of IPv6 through 6LowPAN
  4. Securing the network for confidentiality, integrity and authentication

The introduction of 6LoWPAN allows for the compression of IPv6, which provides for a lighter weight protocol suitable for deployment in WSNs. This is a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required