2017
DOI: 10.1109/mwc.2017.1600141wc
|View full text |Cite
|
Sign up to set email alerts
|

Secure Machine-Type Communications toward LTE Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…M2M connectivity refers to machine communication without human interventions [ 104 , 105 ]. It has been predicted that more than 15 billion M2M connectivity would occur via the Internet by 2021 [ 106 ]. These machines or devices would be connected, collect data from surrounding environments, and share collected data with each other and humans in high security.…”
Section: ML For Enhancing Connectivity In Iot Environmentsmentioning
confidence: 99%
“…M2M connectivity refers to machine communication without human interventions [ 104 , 105 ]. It has been predicted that more than 15 billion M2M connectivity would occur via the Internet by 2021 [ 106 ]. These machines or devices would be connected, collect data from surrounding environments, and share collected data with each other and humans in high security.…”
Section: ML For Enhancing Connectivity In Iot Environmentsmentioning
confidence: 99%
“…For example, an opponent who manages to falsify an intellectual ID can force their owner to pay the opponent's costs. Even worse it appears as a server, because it can trigger a launch attack [58]. The attackers make an unauthorized M2M device.…”
Section: The Security Challenges and Attacks In Iotmentioning
confidence: 99%
“…Therefore, these solutions are not viable for critical infrastructure communication in 5G. Thus a higher level of security for critical communication is achievable by utilizing new security mechanisms such as physical layer security adopting Radio-Frequency (RF) fingerprinting [58], using asymmetric security schemes [59] and dynamically changing security parameters according to the situation [21]. Similarly, end-to-end user communication can be secured by using cryptographic protocols like HIP as presented in [60].…”
Section: Security Solutions For Communication Channelsmentioning
confidence: 99%