The Internet of Things (IoT)/Machine to Machine (M2M) service must provide security mechanisms to avoid illegal usage of the service. However, in some situation the gateways involved in the IoT/M2M systems are resource-constrained. Hence, the commonly used Transport Layer Security (TLS) protocol cannot be readily applicable to ensure the security of the IoT/M2M systems. Our research focuses on providing IoT/M2M system security under the limitation of constrained gateways. We design a security mechanism on top of the security framework defined in the oneM2M standard to address this problem. Furthermore, we implement this mechanism on the OM2M platform and evaluate it in terms of cost and performance.
CITATION STYLE
Chen, K. L., & Lin, F. J. (2017). Ensuring IoT/M2M system security under the limitation of constrained gateways. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10658 LNCS, pp. 302–311). Springer Verlag. https://doi.org/10.1007/978-3-319-72395-2_28
Mendeley helps you to discover research relevant for your work.