2016
DOI: 10.1109/comst.2016.2515516
|View full text |Cite
|
Sign up to set email alerts
|

M2M Security: Challenges and Solutions

Abstract: IEEE Communications Surveys and Tutorials, à paraître.International audienceMachine-to-Machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down Machine-to-Machine growth and even hinder the massive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0
5

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(48 citation statements)
references
References 50 publications
0
43
0
5
Order By: Relevance
“…It provides the best latency and scalability for large-scale connected IoT devices. Regarding M2M communications, Barki et al [ 52 ] provided a survey that addresses the security challenges and threats that arise when dealing with a fusion of heterogeneous networks.…”
Section: Related Workmentioning
confidence: 99%
“…It provides the best latency and scalability for large-scale connected IoT devices. Regarding M2M communications, Barki et al [ 52 ] provided a survey that addresses the security challenges and threats that arise when dealing with a fusion of heterogeneous networks.…”
Section: Related Workmentioning
confidence: 99%
“…The multiple served and idle users coexisting network is depicted in Figure . The depiction in Figure may be an abstraction from the vehicle‐to‐vehicle, vehicle‐to‐infrastructure, machine‐to‐machine, device‐to‐device, mobile social network, cloud radio access network, or homogeneous/heterogeneous network, and the node that provides services may represent a macro/micro base station, a relay, a terminal, or a centralized cloud service center . Moreover, each authorized user has two access statuses, that is, being served and idle, and each status may be switched into another one in each transmission time interval (TTI).…”
Section: System Modelmentioning
confidence: 99%
“…Therefore, the threats of information security should be relieved. We can find that two types of treats mainly exist, namely, active attacking (containing interference attack, pilot attack, denial‐of‐service attack, replay attack, data injection attack, information‐centric networking attack, and so on) and passive eavesdropping . At here, we investigate the latter one and emphasize the wiretap among multiple users (i.e., multi‐user confidential problem) caused by the users' mutual distrust.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…• Ensure packet origin authentication: In [119], the authors have stated that packets origin authentication can be used to prevent the injection of malicious packets by an attacker to an IoT system. Therefore, this guideline suggests that data origin authentication must be integrated into IoT protocols.…”
mentioning
confidence: 99%