A study of information security for M2M of IOT

M2M, means "Machine to Machine", including "Machine to Mobile", "Man to Machine", etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Ročník 3; s. V3-576 - V3-579
Hlavní autoři: Du Jiang, Chao ShiWei
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.08.2010
Témata:
ISBN:1424465397, 9781424465392
ISSN:2154-7491
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:M2M, means "Machine to Machine", including "Machine to Mobile", "Man to Machine", etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large quantities, and also be mobile, making it unrealistic or impossible for operators or subscribers to send personnel to manage or service it. These requirements introduce a number of unique security vulnerabilities for the M2M and the wireless communication networks. So, in this paper, I will represent the possible security threats and their corresponding analysis from M2M's structure, which consists of front-end sensors and equipment, networks, back-end IT systems.
ISBN:1424465397
9781424465392
ISSN:2154-7491
DOI:10.1109/ICACTE.2010.5579563