skip to main content
research-article

Making Constrained Things Reachable: A Secure IP-Agnostic NAT Traversal Approach for IoT

Published:05 October 2018Publication History
Skip Abstract Section

Abstract

The widespread adoption of the Internet of Things (IoT) has created a demand for ubiquitous connectivity of IoT devices into the Internet. While end-to-end connectivity for IoT requires in practice IPv6, a vast majority of nodes in Internet are only IPv4-capable. To address this issue, the use of Network Address Translation (NAT) at the IoT network boundary becomes necessary. However, the constrained nature of the IoT devices hinders the integration of traditional NAT traversal architectures through IoT networks.

In this article, we introduce a novel transition mechanism that transparently enables IoT devices behind NATs to connect across different network-layer infrastructures. Our mechanism adopts the IoT standards to provide a global connectivity solution in a transparent, secure, and elegant way. Additionally, we revisit the NAT solutions for IoT and describe and evaluate our current implementation.

References

  1. C. Aoun and E. Davies. 2007. Reasons to move the Network Address Translator-Protocol Translator (NAT-PT) to historic status. Retrieved from http://www.ietf.org/rfc/rfc4966.txt.Google ScholarGoogle Scholar
  2. F. Audet and C. Jennings. 2007. Network Address Translation (NAT) behavioral requirements for Unicast UDP. Retrieved from http://www.ietf.org/rfc/rfc4787.txt.Google ScholarGoogle Scholar
  3. M. Bagnulo, P. Matthews, and I. van Beijnum. 2011. Stateful NAT64: Network address and protocol translation from IPv6 Clients to IPv4 Servers. Retrieved from http://www.ietf.org/rfc/rfc6146.txt.Google ScholarGoogle Scholar
  4. M. Bagnulo, A. Sullivan, P. Matthews, and I. van Beijnum. 2011. DNS64: DNS extensions for network address translation from IPv6 clients to IPv4 servers. Retrieved from http://www.ietf.org/rfc/rfc6147.txt.Google ScholarGoogle Scholar
  5. C. Bormann, M. Ersue, and A. Keranen. 2014. Terminology for constrained-node networks. Retrieved from http://www.ietf.org/rfc/rfc7228.txt.Google ScholarGoogle Scholar
  6. B. Carpenter. 2011. Advisory guidelines for 6to4 deployment. Retrieved from http://www.ietf.org/rfc/rfc6343.txt.Google ScholarGoogle Scholar
  7. S. Cheshire and M. Krochmal. 2013. NAT Port Mapping Protocol (NAT-PMP). Retrieved from http://www.ietf.org/rfc/rfc6886.txt.Google ScholarGoogle Scholar
  8. S. Deering and R. Hinden. 1998. Internet Protocol, Version 6 (IPv6) Specification. Retrieved from http://www.ietf.org/rfc/rfc2460.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Despres. 2010. IPv6 Rapid Deployment on IPv4 Infrastructures (6rd). Retrieved from http://www.ietf.org/rfc/rfc5569.txt.Google ScholarGoogle Scholar
  10. Ericsson 2017. Ericsson Mobility Report: On the Pulse of the Networked Society. Technical Report. Ericsson. Retrieved from https://www.ericsson.com/mobility-report.Google ScholarGoogle Scholar
  11. Roy Thomas Fielding. 2000. Architectural Styles and the Design of Network-based Software Architectures. Ph.D. Dissertation. University of California, Irvine. Retrieved from http://www.ics.uci.edu/∼fielding/pubs/dissertation/rest_arch_style.htm.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. IEEE 2017. IEEE 802.15 standard. Retrieved from http://www.ieee802.org/15.Google ScholarGoogle Scholar
  13. IGD 2017. Internet Gateway Device (IGD). Retrieved from https://openconnectivity.org/upnp/specifications.Google ScholarGoogle Scholar
  14. N. Kushalnagar, G. Montenegro, and C. Schumacher. 2007. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Retrieved from http://www.ietf.org/rfc/rfc4919.txt.Google ScholarGoogle Scholar
  15. LWM2M 2017. OMA Lightweight M2M, technical specification. Retrieved from http://openmobilealliance.org/about-oma/work-program/m2m-enablers/.Google ScholarGoogle Scholar
  16. R. Mahy, P. Matthews, and J. Rosenberg. 2010. Traversal Using Relays around NAT (TURN): Relay extensions to Session Traversal Utilities for NAT (STUN). Retrieved from http://www.ietf.org/rfc/rfc5766.txt.Google ScholarGoogle Scholar
  17. MQTT 2017. MQTT specification. Retrieved from http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.pdf.Google ScholarGoogle Scholar
  18. J. Rosenberg. 2010. Interactive Connectivity Establishment (ICE): A protocol for Network Address Translator (NAT) traversal for offer/answer protocols. Retrieved from http://www.ietf.org/rfc/rfc5245.txt.Google ScholarGoogle Scholar
  19. J. Rosenberg, R. Mahy, P. Matthews, and D. Wing. 2008. Session Traversal Utilities for NAT (STUN). Retrieved from http://www.ietf.org/rfc/rfc5389.txt.Google ScholarGoogle Scholar
  20. J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. 2003. STUN—Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators (NATs). Retrieved from http://www.ietf.org/rfc/rfc3489.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Z. Shelby, K. Hartke, and C. Bormann. 2014. The Constrained Application Protocol (CoAP). Retrieved from http://www.ietf.org/rfc/rfc7252.txt.Google ScholarGoogle Scholar
  22. Zach Shelby, Michael Koster, Carsten Bormann, Peter Van der Stok, and Christian Amsuss. 2018. CoRE Resource Directory. Internet Engineering Task Force. Retrieved from https://datatracker.ietf.org/doc/html/draft-ietf-core-resource-directory.Google ScholarGoogle Scholar
  23. P. Srisuresh and M. Holdrege. 1999. IP Network Address Translator (NAT) terminology and considerations. Retrieved from http://www.ietf.org/rfc/rfc2663.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Thread 2017. Thread network protocol. Retrieved from https://www.threadgroup.org/.Google ScholarGoogle Scholar
  25. O. Troan and B. Carpenter. 2015. Deprecating the Anycast prefix for 6to4 relay routers. Retrieved from http://www.ietf.org/rfc/rfc7526.txt.Google ScholarGoogle Scholar
  26. G. Tsirtsis and P. Srisuresh. 2000. Network Address Translation--Protocol Translation (NAT-PT). Retrieved from http://www.ietf.org/rfc/rfc2766.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Wing, S. Cheshire, M. Boucadair, R. Penno, and P. Selkirk. 2013. Port Control Protocol (PCP). Retrieved from http://www.ietf.org/rfc/rfc6887.txt.Google ScholarGoogle Scholar
  28. Zigbee. 2017. Zigbee Alliance. Retrieved from http://www.zigbee.org/zigbee-for-developers/zigbee.Google ScholarGoogle Scholar

Index Terms

  1. Making Constrained Things Reachable: A Secure IP-Agnostic NAT Traversal Approach for IoT

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 19, Issue 1
        Regular Papers, Special Issue on Service Management for IOT and Special Issue on Knowledge-Driven BPM
        February 2019
        321 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3283809
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 October 2018
        • Accepted: 1 March 2018
        • Revised: 1 December 2017
        • Received: 1 August 2017
        Published in toit Volume 19, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader