Internet of Things Virtual Networks: Bringing Network Virtualization to Resource-Constrained Devices

Networks of smart resource-constrained objects, such as sensors and actuators, can support a wide range of application domains. In most cases these networks were proprietary and stand-alone. More recently, many efforts have been undertaken to connect these networks to the Internet using standard protocols. Current solutions that integrate smart resource-constrained objects into the Internet are mostly gateway-based. In these solutions, security, firewalling, protocol translations and intelligence are implemented by gateways at the border of the Internet and the resource-constrained networks. In this paper, we introduce a complementary approach to facilitate the realization of what is called the Internet of Things. Our approach focuses on the objects, both resource-constrained and non-constrained, that need to cooperate by integrating them into a secured virtual network, named an Internet of Things Virtual Network or IoTVN. Inside this IoT-VN full end-to-end communication can take place through the use of protocols that take the limitations of the most resource-constrained devices into account. We describe how this concept maps to several generic use cases and, as such, can constitute a valid alternative approach for supporting selected applications. A first implementation demonstrating the key concepts of this approach is described. It illustrates the feasibility of integrating resource-constrained devices into virtual networks, but also reveals open challenges.

[1]  Stefan Bouckaert,et al.  The w-iLab.t Testbed , 2010, TRIDENTCOM.

[2]  Jonathan Freeman,et al.  The Virtual LAN Technology Report , 1997 .

[3]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[4]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[5]  Qi Han,et al.  Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications , 2007, Fourth International Conference on Information Technology (ITNG'07).

[6]  Ingrid Moerman,et al.  IDRA: A flexible system architecture for next generation wireless sensor networks , 2011, Wirel. Networks.

[7]  Stefan Bouckaert,et al.  Managed Ecosystems of Networked Objects , 2011, Wirel. Pers. Commun..

[8]  Oscar Garcia-Morchon,et al.  Security Considerations in the IP-based Internet of Things , 2013 .

[9]  Ashfaq A. Khokhar,et al.  Virtual private networks: an overview with performance evaluation , 2004, IEEE Communications Magazine.

[10]  Zach Shelby,et al.  Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.

[11]  Jeroen Hoebeke Adaptive ad hoc routing and its application in Virtual Private Ad Hoc Networks , 2007 .

[12]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[13]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[14]  Eddie Kohler,et al.  The Click modular router , 1999, SOSP.

[15]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.