Title
Analysis of security protocols and corresponding cipher suites in ETSI M2M standards
Abstract
ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are several protocols that we can choose. However, the standards do not describe in what condition a particular protocol will be the best among the others. In this paper we analyze which protocol is the most suitable for the use case where an IoT/M2M application generates a large amount of data in a short period of time. The criteria used include efficiency, cost, and effectiveness of the protocol. Our analysis is done based on the actual measurement of an ETSI standard-compliant prototype.
Year
DOI
Venue
2015
10.1109/WF-IoT.2015.7389152
WF-IoT
Keywords
Field
DocType
Machine-to-Machine Communication, The Internet of Things, security protocols
Machine to machine,Cipher,Cryptographic protocol,Computer science,Bootstrapping,Computer security,Internet of Things,Computer network,Security association,Security service
Conference
Citations 
PageRank 
References 
2
0.36
2
Authors
2
Name
Order
Citations
PageRank
Daniel Adrianto120.36
Fuchun Joseph Lin29620.75