Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Communication and Security in Machine-to-Machine Systems (CROSBI ID 52997)

Prilog u knjizi | izvorni znanstveni rad

Bojić, Iva ; Granjal, Jorge ; Monteiro, Edmundo ; Katušić, Damjan ; Skočir, Pavle ; Kušek, Mario ; Ježić, Gordan. Communication and Security in Machine-to-Machine Systems // Wireless Networking for Moving Objects: Protocols, Architectures, Tools, Services and Applications / Ganchev, Ivan ; Curado, Marilia and Kassler, Andreas (ur.). Cham : Heidelberg : New York : Dordrecht : London: Springer, 2014. str. 255-281

Podaci o odgovornosti

Bojić, Iva ; Granjal, Jorge ; Monteiro, Edmundo ; Katušić, Damjan ; Skočir, Pavle ; Kušek, Mario ; Ježić, Gordan.

engleski

Communication and Security in Machine-to-Machine Systems

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.

M2M, communication identifiers, M2M security, 6LoWPAN security

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

255-281.

objavljeno

Podaci o knjizi

Wireless Networking for Moving Objects: Protocols, Architectures, Tools, Services and Applications

Ganchev, Ivan ; Curado, Marilia and Kassler, Andreas

Cham : Heidelberg : New York : Dordrecht : London: Springer

2014.

978-3-319-10834-6

Povezanost rada

Elektrotehnika, Računarstvo