Abstract | ||
---|---|---|
ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are several protocols that we can choose. However, the standards do not describe in what condition a particular protocol will be the best among the others. In this paper we analyze which protocol is the most suitable for the use case where an IoT/M2M application generates a large amount of data in a short period of time. The criteria used include efficiency, cost, and effectiveness of the protocol. Our analysis is done based on the actual measurement of an ETSI standard-compliant prototype. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/WF-IoT.2015.7389152 | WF-IoT |
Keywords | Field | DocType |
Machine-to-Machine Communication, The Internet of Things, security protocols | Machine to machine,Cipher,Cryptographic protocol,Computer science,Bootstrapping,Computer security,Internet of Things,Computer network,Security association,Security service | Conference |
Citations | PageRank | References |
2 | 0.36 | 2 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Adrianto | 1 | 2 | 0.36 |
Fuchun Joseph Lin | 2 | 96 | 20.75 |