SlideShare a Scribd company logo
4
Most read
8
Most read
9
Most read
- 1
IPv6 & IoT
APRICOT 2019 / APNIC 47
February 2019
Daejeon, South Korea
@JordiPalet
(jordi.palet@theipv6company.com)
- 2
Full (incomplete) Picture
* https://www.postscapes.com/internet-of-things-alliances-roundup/
- 3
Why IoT with IPv6?
• Huge number of addresses (devices)
• Autoconfiguration
• Header compression
• IPv6-only: Dual-stack is not an option (tiny
devices)
• Avoid using non-IP such as ZigBee
- 4
6LoWPAN
• Initial IETF work on IoT
–IPv6 over Low Power Wireless Personal Area Networks
• 6LoWPAN
–IPv6 adaptation layer
• IEEE 802.15.4
–PHY & MAC layers
–Encryption
–127 bytes payload
IEEE 802.15.4 & 6
PHY
868MHz / 915MHz / 2.4GHz
Simpler MAC
32- / 64- / 128-bit encryption
LoWPAN shim
Fragmentation, Compression,
IPv6
Application
Stack Profile
IEEE
802.15.4
IETF
6LoWPAN
– IPv6 adaptation
IEEE 802.15.4
– encryption
– Physical & Media Ac
Control layers
– 127 bytes payload
IEEE 802.15.4 & 6LoWPAN
PHY
868MHz / 915MHz / 2.4GHz
Simpler MAC
32- / 64- / 128-bit encryption
LoWPAN shim
Fragmentation, Compression,
IPv6
Application
Stack Profile
IEEE
802.15.4
IETF
- 5
6LoWPAN Challenges
• Small packets
– Fragmentation
– Header Compression
• ND not efficient in low power wireless
• Topology
– Star and mesh
• Security and Privacy
– Nodes have low computing resources
– May be physically reachable
• Nodes may “sleep”
- 6
6Lo
• IPv6 over Networks of Resource-constrained Nodes
–Extend 6LoWPAN
–ND extensions
–Privacy
–Other PHY (Bluetooth LE, DECT ULE, G3-PLC, MS/TP,
NFC, Z-Wave, …)
- 7
6TiSCH
• IPv6 over the TSCH mode of IEEE 802.15.4e
• “Deterministic 802.15.4”
• The Timeslotted Channel Hopping (TSCH) mode was introduced in 2012 as
an amendment to the Medium Access Control (MAC) portion of the
IEEE802.15.4 standard.
• Nodes in a IEEE802.15.4 TSCH network communicate by following a Time
Division Multiple Access (TDMA) schedule.
• Use cases for LLNs (Low-power and Lossy Networks), including:
– Control loops in a wireless process control network, in which high reliability and a fully
deterministic behavior are required.
– Service Provider networks transporting data from different independent clients, and for
which an operator needs flow isolation and traffic shaping.
– Networks comprising energy harvesting nodes, which require an extremely low and
predictable average power consumption.
- 8
ROLL
• Routing Over Low power and Lossy networks
• RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks)
• L3 addresses
• Multiple IP links and IEEE802 broadcast/multicast domains
• Multiple border routers
• Reassembly in each hop
• Apps can see multiple link-locals
- 9
CoRE
• Constrained RESTful Environments
• Defined a Constrained Application Protocol (CoAP) for the
manipulation of Resources on a Device
• Request/Responses
• HTTP transaction typically 10 times higher than CoAP
• Power consumption matters! Lifetime!
- 10
DICE
• DTLS In Constrained Environments
• Supporting the use of Datagram Transport Layer Security in
these environments
- 11
ACE
• Authentication and Authorization for Constrained
Environments
• Solution for authentication and authorization to enable
authorized access (Get, Put, Post, Delete) to resources
identified by a URI and hosted on a resource server in
constrained environments
- 12
LPWAN
• IPv6 over Low-Power Wide-Area Networks
– SIGFOX, LoRa, WI-SUN and NB-IOT
• Optimized radio modulation
• Star topology
• Frame sizes in the order of tens of bytes transmitted a few
times per day at ultra-low speeds and sometimes variable
MTUs
• Downstream may be supported, but mostly upstream
transmission (devices in low-energy deep-sleep mode)
• Enables ranges of several Kms with long battery lifetime (10
years with a single coin-cell)
- 13
LWIG
• Light-Weight Implementation Guidance
• The goal is to be able to build minimal yet interoperable IP-
capable devices for the most constrained environments
• There are implementations that go even further in
minimization and can exist in as few as a couple of kilobytes
of code
- 14
SUIT
• Software Updates for Internet of Things
• Vulnerabilities in Internet of Things (IoT) devices have raised
the need for a secure firmware update mechanism that is
also suitable for constrained devices (Class 1 and up).
• RFC7228 defines “Classes of Constrained Devices”:
Name Data Size Code Size
(e.g., RAM) (e.g., Flash)
Class 0, C0 <10 KiB <100 KiB
Class 1, C1 ~10 KiB ~100 KiB
Class 2, C2 ~50 KiB ~250 KiB
- 15
Web of Things (I)
• Defines architecture to facilitate interoperability and
applications development by means of an
application layer
–CoAP for management
–CBOR and JSON for data formats
–DTLS and TLS for secure communications
–COSE and JOSE for object security (CBOR/JSON
Object Signing and Encryption)
–ACE for authenticated authorizations
- 16
Web of Things (II)
Web$of$Things
Hypermedia$Web$Applications
IPSO$Objects$+$Hypermedia
OMA$LWM2M
CoAP HTTP
6LowPAN IPv4/IPv6
MCU$–$16KiB$RAM MPU
802.15.4 WiFi,$Ethernet
Hardware
HW$Network
Routing
Application$Protocol
API$and$Services
Data$Models
Application
Web$Server
- 17
Thread Group
• Vendors consortium based on IPv6, 802.15.4 and 6LoWPAN
– Low-power wireless mesh based on IPv6.
– Enables device-to-device and device-to-cloud communications and
reliably connects hundreds (or thousands) of products and includes
mandatory security features.
– Thread networks have no single point of failure, can self-heal and
reconfigure when a device is added or removed, and are simple to
setup and use.
– Thread is based on the broadly supported IEEE 802.15.4 radio
standard, which is designed from the ground up for extremely low
power consumption and low latency.
- 18
Thanks!
Contact:
@JordiPalet
jordi.palet@theipv6company.com

More Related Content

PDF
5G Security Briefing
PDF
An Introduction to Generative AI
PDF
[Cntt] bài giảng kĩ thuật vi xử lí
PPT
chapter 7 -wireless network security.ppt
PPT
Queuing analysis
PPTX
Transmission Control Protocol (TCP)
PPTX
Zigbee Presentation
PPTX
Smart Home Using IOT simulation In cisco packet tracer
5G Security Briefing
An Introduction to Generative AI
[Cntt] bài giảng kĩ thuật vi xử lí
chapter 7 -wireless network security.ppt
Queuing analysis
Transmission Control Protocol (TCP)
Zigbee Presentation
Smart Home Using IOT simulation In cisco packet tracer

What's hot (20)

PDF
IoT Communication Protocols
PDF
IoT Networking
PDF
Chapter 7
PPT
The constrained application protocol (CoAP)
PPTX
Network Virtualization
PPTX
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
PPTX
IOT - Unit 3.pptx
PPTX
Technology Behind IoT (JNTUK - Unit - 1)
PPTX
PPTX
Network tunneling techniques
PPT
Cloud computing
PPTX
3.pillars of embedded io t and physical devices
PPTX
Introduction to IoT - Unit I
PPTX
PPTX
RFID with INTERNET OF THINGS
PPTX
PDF
Service-Oriented Architecture (SOA)
PPTX
Ppt 3 - IOT logic design
PDF
Application Layer Protocols for the IoT
PPT
IoT Communication Protocols
IoT Networking
Chapter 7
The constrained application protocol (CoAP)
Network Virtualization
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
IOT - Unit 3.pptx
Technology Behind IoT (JNTUK - Unit - 1)
Network tunneling techniques
Cloud computing
3.pillars of embedded io t and physical devices
Introduction to IoT - Unit I
RFID with INTERNET OF THINGS
Service-Oriented Architecture (SOA)
Ppt 3 - IOT logic design
Application Layer Protocols for the IoT
Ad

Similar to IPv6 and IoT (20)

PDF
IOT_MODULE_3.pdf simple example notes for use
PDF
ch5-Fog Networks and Cloud Computing
PPT
L6 6 lowpan
PDF
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
PPTX
Module 1.pptx
PPTX
Final_IoT_Protocol Stack.pptx
PDF
Networking - TCP/IP stack introduction and IPv6
PDF
Internet of things a survey on enabling technologies, protocols and applicat...
PDF
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
PPT
E s switch_v6_ch01
PDF
Web Services for the Internet of Things
PDF
Intel IPSO/6LoWPAN solution for general wireless sensor network
PDF
100G Networking Berlin.pdf
PDF
IoT PROTOCOLS IoT Access Technologies Physical and MAC layers, topology and S...
PPTX
715677653-CPE-445-Internet-of-Things-Chapter-6.pptx
PPTX
715677653-CPE-445-Internet-of-Things-Chapter-6.pptx
PDF
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
PPTX
6 lowpan
PDF
Haystack Technology Overview
PDF
Module 03 IoT Networking.............pdf
IOT_MODULE_3.pdf simple example notes for use
ch5-Fog Networks and Cloud Computing
L6 6 lowpan
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
Module 1.pptx
Final_IoT_Protocol Stack.pptx
Networking - TCP/IP stack introduction and IPv6
Internet of things a survey on enabling technologies, protocols and applicat...
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
E s switch_v6_ch01
Web Services for the Internet of Things
Intel IPSO/6LoWPAN solution for general wireless sensor network
100G Networking Berlin.pdf
IoT PROTOCOLS IoT Access Technologies Physical and MAC layers, topology and S...
715677653-CPE-445-Internet-of-Things-Chapter-6.pptx
715677653-CPE-445-Internet-of-Things-Chapter-6.pptx
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
6 lowpan
Haystack Technology Overview
Module 03 IoT Networking.............pdf
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Introduction to the IoT system, how the IoT system works
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
artificial intelligence overview of it and more
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPT
Ethics in Information System - Management Information System
PPTX
Introduction to Information and Communication Technology
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
DOCX
Unit-3 cyber security network security of internet system
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
E -tech empowerment technologies PowerPoint
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
innovation process that make everything different.pptx
Paper PDF World Game (s) Great Redesign.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Introduction to the IoT system, how the IoT system works
artificialintelligenceai1-copy-210604123353.pptx
artificial intelligence overview of it and more
Design_with_Watersergyerge45hrbgre4top (1).ppt
Ethics in Information System - Management Information System
Introduction to Information and Communication Technology
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Power Point - Lesson 3_2.pptx grad school presentation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Unit-3 cyber security network security of internet system
Exploring VPS Hosting Trends for SMBs in 2025
SASE Traffic Flow - ZTNA Connector-1.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
E -tech empowerment technologies PowerPoint
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)

IPv6 and IoT

  • 1. - 1 IPv6 & IoT APRICOT 2019 / APNIC 47 February 2019 Daejeon, South Korea @JordiPalet (jordi.palet@theipv6company.com)
  • 2. - 2 Full (incomplete) Picture * https://www.postscapes.com/internet-of-things-alliances-roundup/
  • 3. - 3 Why IoT with IPv6? • Huge number of addresses (devices) • Autoconfiguration • Header compression • IPv6-only: Dual-stack is not an option (tiny devices) • Avoid using non-IP such as ZigBee
  • 4. - 4 6LoWPAN • Initial IETF work on IoT –IPv6 over Low Power Wireless Personal Area Networks • 6LoWPAN –IPv6 adaptation layer • IEEE 802.15.4 –PHY & MAC layers –Encryption –127 bytes payload IEEE 802.15.4 & 6 PHY 868MHz / 915MHz / 2.4GHz Simpler MAC 32- / 64- / 128-bit encryption LoWPAN shim Fragmentation, Compression, IPv6 Application Stack Profile IEEE 802.15.4 IETF 6LoWPAN – IPv6 adaptation IEEE 802.15.4 – encryption – Physical & Media Ac Control layers – 127 bytes payload IEEE 802.15.4 & 6LoWPAN PHY 868MHz / 915MHz / 2.4GHz Simpler MAC 32- / 64- / 128-bit encryption LoWPAN shim Fragmentation, Compression, IPv6 Application Stack Profile IEEE 802.15.4 IETF
  • 5. - 5 6LoWPAN Challenges • Small packets – Fragmentation – Header Compression • ND not efficient in low power wireless • Topology – Star and mesh • Security and Privacy – Nodes have low computing resources – May be physically reachable • Nodes may “sleep”
  • 6. - 6 6Lo • IPv6 over Networks of Resource-constrained Nodes –Extend 6LoWPAN –ND extensions –Privacy –Other PHY (Bluetooth LE, DECT ULE, G3-PLC, MS/TP, NFC, Z-Wave, …)
  • 7. - 7 6TiSCH • IPv6 over the TSCH mode of IEEE 802.15.4e • “Deterministic 802.15.4” • The Timeslotted Channel Hopping (TSCH) mode was introduced in 2012 as an amendment to the Medium Access Control (MAC) portion of the IEEE802.15.4 standard. • Nodes in a IEEE802.15.4 TSCH network communicate by following a Time Division Multiple Access (TDMA) schedule. • Use cases for LLNs (Low-power and Lossy Networks), including: – Control loops in a wireless process control network, in which high reliability and a fully deterministic behavior are required. – Service Provider networks transporting data from different independent clients, and for which an operator needs flow isolation and traffic shaping. – Networks comprising energy harvesting nodes, which require an extremely low and predictable average power consumption.
  • 8. - 8 ROLL • Routing Over Low power and Lossy networks • RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) • L3 addresses • Multiple IP links and IEEE802 broadcast/multicast domains • Multiple border routers • Reassembly in each hop • Apps can see multiple link-locals
  • 9. - 9 CoRE • Constrained RESTful Environments • Defined a Constrained Application Protocol (CoAP) for the manipulation of Resources on a Device • Request/Responses • HTTP transaction typically 10 times higher than CoAP • Power consumption matters! Lifetime!
  • 10. - 10 DICE • DTLS In Constrained Environments • Supporting the use of Datagram Transport Layer Security in these environments
  • 11. - 11 ACE • Authentication and Authorization for Constrained Environments • Solution for authentication and authorization to enable authorized access (Get, Put, Post, Delete) to resources identified by a URI and hosted on a resource server in constrained environments
  • 12. - 12 LPWAN • IPv6 over Low-Power Wide-Area Networks – SIGFOX, LoRa, WI-SUN and NB-IOT • Optimized radio modulation • Star topology • Frame sizes in the order of tens of bytes transmitted a few times per day at ultra-low speeds and sometimes variable MTUs • Downstream may be supported, but mostly upstream transmission (devices in low-energy deep-sleep mode) • Enables ranges of several Kms with long battery lifetime (10 years with a single coin-cell)
  • 13. - 13 LWIG • Light-Weight Implementation Guidance • The goal is to be able to build minimal yet interoperable IP- capable devices for the most constrained environments • There are implementations that go even further in minimization and can exist in as few as a couple of kilobytes of code
  • 14. - 14 SUIT • Software Updates for Internet of Things • Vulnerabilities in Internet of Things (IoT) devices have raised the need for a secure firmware update mechanism that is also suitable for constrained devices (Class 1 and up). • RFC7228 defines “Classes of Constrained Devices”: Name Data Size Code Size (e.g., RAM) (e.g., Flash) Class 0, C0 <10 KiB <100 KiB Class 1, C1 ~10 KiB ~100 KiB Class 2, C2 ~50 KiB ~250 KiB
  • 15. - 15 Web of Things (I) • Defines architecture to facilitate interoperability and applications development by means of an application layer –CoAP for management –CBOR and JSON for data formats –DTLS and TLS for secure communications –COSE and JOSE for object security (CBOR/JSON Object Signing and Encryption) –ACE for authenticated authorizations
  • 16. - 16 Web of Things (II) Web$of$Things Hypermedia$Web$Applications IPSO$Objects$+$Hypermedia OMA$LWM2M CoAP HTTP 6LowPAN IPv4/IPv6 MCU$–$16KiB$RAM MPU 802.15.4 WiFi,$Ethernet Hardware HW$Network Routing Application$Protocol API$and$Services Data$Models Application Web$Server
  • 17. - 17 Thread Group • Vendors consortium based on IPv6, 802.15.4 and 6LoWPAN – Low-power wireless mesh based on IPv6. – Enables device-to-device and device-to-cloud communications and reliably connects hundreds (or thousands) of products and includes mandatory security features. – Thread networks have no single point of failure, can self-heal and reconfigure when a device is added or removed, and are simple to setup and use. – Thread is based on the broadly supported IEEE 802.15.4 radio standard, which is designed from the ground up for extremely low power consumption and low latency.