ABSTRACT
In this paper, we argue that existing concepts for the design and implementation of network stacks for constrained devices do not comply with the requirements of current and upcoming Internet of Things (IoT) use cases. The IoT requires not only a lightweight but also a modular network stack, based on standards. We discuss functional and non-functional requirements for the software architecture of the network stack on constrained IoT devices. Then, revisiting concepts from the early Internet as well as current implementations, we propose a future-proof alternative to existing IoT network stack architectures, and provide an initial evaluation of this proposal based on its implementation running on top of state-of-the-art IoT operating system and hardware.
- IEEE Std 1003.1, 2004 Edition. http://www.unix.org/version3/, January 2002.Google Scholar
- IoT-LAB: Very large scale open wireless sensor network testbed. https://www.iot-lab.info/hardware/m3/, January 2015.Google Scholar
- RIOT Github Repository. https://github.com/RIOT-OS/RIOT, January 2015.Google Scholar
- TI's CC3000. http://www.ti.com/product/cc3000, January 2015.Google Scholar
- Borchert, C., Lohmann, D., and Spinczyk, O. CiAO/IP: A Highly Configurable Aspect-oriented IP Stack. In Proc. of ACM MobiSys (New York, NY, USA, 2012), ACM, pp. 435--448. Google ScholarDigital Library
- Bormann, C., Ersue, M., and Keranen, A. Terminology for Constrained-Node Networks. RFC 7228, IETF, May 2014.Google Scholar
- Brandt, A., Buron, J., and Porcu, G. Home Automation Routing Requirements in Low-Power and Lossy Networks. RFC 5826, IETF, April 2010.Google Scholar
- Chesson, G. L. The Network Unix System. SIGOPS Oper. Syst. Rev. 9, 5 (Nov. 1975), 60--66. Google ScholarDigital Library
- da Silva Santos, E. R., Vieira, M. A., and Vieira, L. F. Routing IPv6 over wireless networks with low-memory devices. In Proc. of IEEE PIMRC (2013), IEEE, pp. 2398--2402.Google ScholarCross Ref
- Dohler, M., Watteyne, T., Winter, T., and Barthel, D. Routing Requirements for Urban Low-Power and Lossy Networks. RFC 5548, IETF, May 2009.Google Scholar
- Dunkels, A. Design and Implementation of the lwIP TCP/IP Stack. Tech. rep., Swedish Institute of Computer Science, 2001.Google Scholar
- Dunkels, A. Full TCP/IP for 8-bit architectures. In Proc. of MobiSys (2003), ACM, pp. 85--98. Google ScholarDigital Library
- Dunkels, A., Gronvall, B., and Voigt, T. Contiki -- a lightweight and exible operating system for tiny networked sensors. In Local Computer Networks, 2004. 29th Annual IEEE International Conference on (2004), IEEE, pp. 455--462. Google ScholarDigital Library
- Durvy, M., Abeillé, J., Wetterwald, P., O'Flynn, C., Leverett, B., Gnoske, E., Vidales, M., Mulligan, G., Tsiftes, N., Finne, N., and Dunkels, A. Making sensor networks IPv6 ready. In Proc. of ACM SenSys (2008), ACM, pp. 421--422. Google ScholarDigital Library
- Hahm, O., Baccelli, E., Petersen, H., Wählisch, M., and Schmidt, T. Simply RIOT: Teaching and Experimental Research in the Internet of Things. In Proc. of ACM/IEEE IPSN (2014), ACM. Google ScholarDigital Library
- Hahm, O., Baccelli, E., and Schleiser, K. Painless class 1 devices programming. Tech. rep.Google Scholar
- Lembo, S., Kuusisto, J., and Manner, J. In depth breakdown of a 6LoWPAN stack for sensor networks. International Journal of Computer Networks & Communications (IJCNC) 2, 6 (2010).Google Scholar
- Levis, P. Experiences from a Decade of TinyOS Development. In OSDI (2012), pp. 207--220. Google ScholarDigital Library
- Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., and Culler, D. TinyOS: An Operating System for Sensor Networks. In Ambient Intelligence. Springer Berlin Heidelberg, 2005, pp. 115--148.Google ScholarCross Ref
- Martocci, J., Mil, P. D., Riou, N., and Vermeylen, W. Building Automation Routing Requirements in Low-Power and Lossy Networks. RFC 5867, IETF, June 2010.Google Scholar
- Mazzer, Y., and Tourancheau, B. Comparisons of 6LoWPAN Implementations on Wireless Sensor Networks. In Proc. of SENSORCOMM (June 2009), pp. 689--692. Google ScholarDigital Library
- Pister, K., Thubert, P., Dwars, S., and Phinney, T. Industrial Routing Requirements in Low-Power and Lossy Networks. RFC 5673, IETF, October 2009.Google Scholar
- Ritchie, D. M. The unix system: A stream input-output system. AT&T Bell Laboratories Technical Journal 63, 8 (1984), 1897--1910.Google ScholarCross Ref
- Sarwar, U., Rao, G. S., Suryady, Z., and Khoshdelniat, R. A comparative study on available IPv6 platforms for wireless sensor network. World Academy of Science, Engineering and Technology 62 (2010), 889--892.Google Scholar
- Wehrle, K. The Linux networking architecture: design and implementation of network protocols in the Linux kernel. Pearson Prentice Hall, Upper Saddle River, N.J, 2004. Google ScholarDigital Library
- Yibo, C., mean Hou, K., Zhou, H., Shi, H.-L., Liu, X., Diao, X., Ding, H., Li, J.-J., and de Vaulx, C. 6LoWPAN Stacks: A Survey. In Proc. of WiCOM (2011).Google Scholar
Index Terms
- Old Wine in New Skins?: Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices
Recommendations
A pattern for a Secure IoT Thing
EuroPLoP '21: Proceedings of the 26th European Conference on Pattern Languages of ProgramsIoT systems are very complex systems with an extensive attack surface, which makes them susceptible to a large variety of threats. It is important that every component in an IoT architecture be secure, any weak point can allow an adversary to penetrate ...
Towards model-based continuous deployment of secure IoT systems
MODELS '19: Proceedings of the 22nd International Conference on Model Driven Engineering Languages and SystemsSoftware development and delivery of IoT systems would greatly benefit from DevOps as their requirements for reliability, quality, security and privacy are paramount. The ability to continuously evolve these systems to adapt to their environment is ...
Performance evaluation of mobile RPL-based IoT networks under version number attack
AbstractThe Internet of Things (IoT) has a vital role in communication and has many cross-platform applications which generate a massive volume of data. IoT interconnects various devices from small to big without the direct intervention of ...
Highlights- Attacks in RPL based IoT. Why version attack?
- Analysis of version attack in ...
Comments