2009
DOI: 10.1109/mvt.2009.933478
|View full text |Cite
|
Sign up to set email alerts
|

Trust in M2M communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(45 citation statements)
references
References 5 publications
0
42
0
Order By: Relevance
“…The software platform was designed to be context-aware and used multi-level adaptations to support the dynamic collaboration of devices. The problem of uplink scheduling of M2M devices in Long-Term Evolution (LTE) network was studied by Lioumpas and Alexiou [27], coverage and capacity of M2M in specific realm of LTE were studied by Ratasuk, Tan and Ghosh [28], a trade-off design in M2M communication from a power and energy optimal design perspective was investigated by Dhillon et al [29], large-scale M2M communication and the performance was discussed by [30], and trust and security issues were addressed in the work published by Bartoli et al [31] [32]. To serve dynamic applications across different platforms, Liu et al [33] proposed a naming, addressing, and profile server (NAPS) as a middleware to bridge different platforms in IoT sensory environments.…”
Section: Such As European Telecommunications Standards Institute (Etsmentioning
confidence: 99%
See 1 more Smart Citation
“…The software platform was designed to be context-aware and used multi-level adaptations to support the dynamic collaboration of devices. The problem of uplink scheduling of M2M devices in Long-Term Evolution (LTE) network was studied by Lioumpas and Alexiou [27], coverage and capacity of M2M in specific realm of LTE were studied by Ratasuk, Tan and Ghosh [28], a trade-off design in M2M communication from a power and energy optimal design perspective was investigated by Dhillon et al [29], large-scale M2M communication and the performance was discussed by [30], and trust and security issues were addressed in the work published by Bartoli et al [31] [32]. To serve dynamic applications across different platforms, Liu et al [33] proposed a naming, addressing, and profile server (NAPS) as a middleware to bridge different platforms in IoT sensory environments.…”
Section: Such As European Telecommunications Standards Institute (Etsmentioning
confidence: 99%
“…Compared with H2H Internet communication, M2M is featured with more communication nodes, lower bandwidth, real-time processing, and many nodes are required to be energy efficient [32]. Since data is the most important concern in M2M systems, the unobtrusive collection, reliable transmission, and effective use of machine-generated data are the main tasks to achieve.…”
Section: B M2m Communication Towards Industrial Applicationsmentioning
confidence: 99%
“…Data integrity solutions should guarantee that an adversary cannot modify data in the transaction without the system detecting the change. The problem of data integrity has been extensively studied in all traditional computing and communication systems and some preliminary results exist for sensor networks [7]. The appropriate encryption algorithm shall be applied to ensure the confidentiality of the data.…”
Section: Related Workmentioning
confidence: 99%
“…Home M2M communications may expose them to a number of potential attacks such as physical attacks, compromise of credentials, configuration attacks, and core network attacks [7]. In [9], these security vulnerabilities are described in the following categories: Compromise of Credentials, Configuration Attacks, Attacks on the Core Network, Device Data and Identity Privacy Attack.…”
Section: Related Workmentioning
confidence: 99%
“…M2M system is installed at the remote place which may be lack of basic security and should be used for long time, which is necessary to manage for the functionality. In case of installing M2M in a condition that requires many uses, it is necessary to have many M2M devices, and most of them are mobile devices which are impossible to control and to manage individual device well, which is unrealistic [3,9,12,13].…”
Section: Introductionmentioning
confidence: 99%