A study of information security for M2M of IOT
M2M, means "Machine to Machine", including "Machine to Mobile", "Man to Machine", etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be...
Uloženo v:
| Vydáno v: | 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Ročník 3; s. V3-576 - V3-579 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.08.2010
|
| Témata: | |
| ISBN: | 1424465397, 9781424465392 |
| ISSN: | 2154-7491 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | M2M, means "Machine to Machine", including "Machine to Mobile", "Man to Machine", etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large quantities, and also be mobile, making it unrealistic or impossible for operators or subscribers to send personnel to manage or service it. These requirements introduce a number of unique security vulnerabilities for the M2M and the wireless communication networks. So, in this paper, I will represent the possible security threats and their corresponding analysis from M2M's structure, which consists of front-end sensors and equipment, networks, back-end IT systems. |
|---|---|
| ISBN: | 1424465397 9781424465392 |
| ISSN: | 2154-7491 |
| DOI: | 10.1109/ICACTE.2010.5579563 |

