Chapter 19–Utilizing IPv6 Security Features
In this chapter, which follows on from the technical discussion on IPv6 and 6LowPAN we introduce the security features built into the IPv6 protocol and why we should make use of them. Additionally, we will look at TLS (transport layer security) routing and securing the IoT layers through the security tenets of CIA.
What the reader will learn in this chapter:
- The built in IPv6 security features
- 6LowPAN and where and how it can be deployed
- Advantages of IPv6 through 6LowPAN
- Securing the network for confidentiality, integrity and authentication
The introduction of 6LoWPAN allows for the compression of IPv6, which provides for a lighter weight protocol suitable for deployment in WSNs. This is a ...
Get IoT Security Issues now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.