Paper Abstract and Keywords |
Presentation |
2016-01-29 16:15
Study on Network Architecture for the efficient transport of Encrypted IoT/M2M packets Shu Yamamoto, Akihiro Nakao (U-Tokyo) IA2015-87 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
When the sensor data is collected from the huge number of IOT/M2M sensor devices through the Internet, the traffic containing the huge number of short packets will be generated because of the tiny data size of the sensor data and supposed to degrade the network performance. In this article, in order to mitigate the effect of such IoT/M2M traffic transported to the data center through the Internet, we will investigate the network architecture to reside the middle boxes to aggregate the short packets at the network gateway as well as to disaggregate the aggregated packets at the gateway of the data center where the collected data is being processed. In addition, to securely send the confidential sensor data to the data center through the public network, the encryption of the sensor data will be required.
To implement these requirements in the proposed architecture, we will use many-core network processors enabling the parallel packet processing with multiple cpus together with high speed encryption/decryption processing by crypto engines resided in the processor. Using many-core network processors, 10Gb/s throughput of the aggregation and encryption was obtained for 64 byte short packets. With the aggregation of short packets, the packet per second (PPS) can be reduced by less tnan 7 percent and the fast encryption/decryption can be achieved. By using the proposed architecture, it is expected that the load due to a large amount of short packets and flows can be reduced by the middle boxes consisting of many-core network processors resided in the network and the network performance will be improved. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
M2M / IoT / Middle Box / Security / Encryption / / / |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 443, IA2015-87, pp. 49-54, Jan. 2016. |
Paper # |
IA2015-87 |
Date of Issue |
2016-01-22 (IA) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IA2015-87 |
Conference Information |
Committee |
IA |
Conference Date |
2016-01-29 - 2016-01-29 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Senser Network, IoT, M2M, etc. |
Paper Information |
Registration To |
IA |
Conference Code |
2016-01-IA |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Study on Network Architecture for the efficient transport of Encrypted IoT/M2M packets |
Sub Title (in English) |
|
Keyword(1) |
M2M |
Keyword(2) |
IoT |
Keyword(3) |
Middle Box |
Keyword(4) |
Security |
Keyword(5) |
Encryption |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Shu Yamamoto |
1st Author's Affiliation |
The University of Tokyo (U-Tokyo) |
2nd Author's Name |
Akihiro Nakao |
2nd Author's Affiliation |
The University of Tokyo (U-Tokyo) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2016-01-29 16:15:00 |
Presentation Time |
30 minutes |
Registration for |
IA |
Paper # |
IA2015-87 |
Volume (vol) |
vol.115 |
Number (no) |
no.443 |
Page |
pp.49-54 |
#Pages |
6 |
Date of Issue |
2016-01-22 (IA) |
|