Ensuring IoT/M2M system security under the limitation of constrained gateways

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance.

Cite

CITATION STYLE

APA

Chen, K. L., & Lin, F. J. (2017). Ensuring IoT/M2M system security under the limitation of constrained gateways. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10658 LNCS, pp. 302–311). Springer Verlag. https://doi.org/10.1007/978-3-319-72395-2_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free