Cooperative Architecture for Secure M2M Communication
نویسندگان
چکیده
This paper presents a cooperative architecture for M2M system security to enable M2M nodes to interface with intelligent devices sensing realworld conditions and control physical devices. We also present performance results of our cooperative architecture that shows that our security scheme is capable of reliably handling concurrent events generated by different types of M2M devices to achieve a high degree of security.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملCooperative Architecture for Secure M2M Communication in Distributed Sensor Networking
Machine to machine (M2M) technology has emerged as a rapidly developing technology for large-scale networking of devices without dependence on human interaction. The new form of machine interconnectivity integrates with cloud computing infrastructure through the Internet however, M2M communication poses unique security challenges as the Internet grow steadily and rapidly. The large number conne...
متن کاملA Cooperative MAC Protocol for a M2M Heterogeneous Area Network
With the increasing demand of Machine to Machine (M2M) communications and Internet of Things (IoT) services it is necessary to develop a new network architecture and protocols to support cost effective, distributed computing systems. Generally, M2M and IoT applications serve a large number of intelligent devices, such as sensors and actuators, which are distributed over large geographical areas...
متن کاملLow delay and secure M2M communication mechanism for eHealthcare
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to an...
متن کاملGLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications
Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of research challenges in M2M is group authentication ...
متن کامل