2011
DOI: 10.1109/mcom.2011.5741143
|View full text |Cite
|
Sign up to set email alerts
|

GRS: The green, reliability, and security of emerging machine to machine communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 185 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…• Issues hindering efficient activity scheduling techniques in machine-to-machine communications for more energy efficiency [37]; • workflow for integrating energy data into material flow simulation [38]; • simulation method for energy optimization [39]; and • algorithm adjusting dynamic properties of robots to reduce energy consumption [40].…”
Section: Orchestrationmentioning
confidence: 99%
See 1 more Smart Citation
“…• Issues hindering efficient activity scheduling techniques in machine-to-machine communications for more energy efficiency [37]; • workflow for integrating energy data into material flow simulation [38]; • simulation method for energy optimization [39]; and • algorithm adjusting dynamic properties of robots to reduce energy consumption [40].…”
Section: Orchestrationmentioning
confidence: 99%
“…In 2011, Lu et al presented a study of prevailing issues that hinder efficient activity scheduling techniques in machine-to-machine communications for more energy efficiency [37]. This focused the attention of the research community on a problem that provided considerable potential for improvement as discussed in the following paragraphs.…”
Section: Orchestrationmentioning
confidence: 99%
“…From a traditional perspective, Rongxing Lu et al [9] have described the security requirements for M2M communication as follows:…”
Section:  User Data and Identity Privacy Attacksmentioning
confidence: 99%
“…Rongxing Lu et al [9] designed a detection mechanism to prevent the M2M system from the node compromising attack in M2M domain. Since it usually takes the attacker some time to compromise the M2M nodes, forming the M2M nodes into couples to monitor each other could be a feasible way to detect compromised node.…”
Section: Detectionmentioning
confidence: 99%
See 1 more Smart Citation