References
- TTA, "Mobile networks based M2M and International Standards Report", Electronics and Telecommunications Research Institute, Electronic and Telecommunications Trends, Vol 26 No.2, 2011
- ETRI, "Trends of Converging Smart Devices with IoT Technology", Electronic Communication Trends Analysis, 2013.
- Machina Research, "GSMA & Machina Research", 2011
- Machina Research, "M2M Cummunication in sectors", 2011
- Machina Research, "M2M Communication in CE 2010-2020", 2011
- ITU-T, "http://www.itu.int/en/ITU-T/focusgroups/m2m/Pages/default.aspx", 2013
- 3GPP, "Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements", 2O14
- ETSI, "TS 102 689 - V2.1.1 - Machine-to-Ma chine communications", 2013
- Z. Shelby, K. Hartke, and C. Borman, "Constrained Application Protocol (CoAP)," draft-ietf-core-coap-18 (work in progress), IETF, June 2013
- Tien-Dung Nguyen, Eui-Nam Huh, "A Dynamic ID-based Authentication Scheme for M2M Communication of healthcare Systems", The International Arab Journal of Information Technology, Vol 9, No 6, 2012
- Jie-Ren Shih, "Securing M2M With Post-Quantum Public-Key Cryptography", Emerging and Selected Topics in Circuits and Systems, IEEE Journal on Volume:3 , Issue: 1
- Eun Seon Gi, "Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments", Korean Institute of Information Security, Vol 20. No.1, 2010.2, 73-83 (11 pages)
- Mui Van Nguyen, Al-Saffar, A. ; Eui-Nam Huh, "A dynamic ID-based authentication scheme", Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 2010
- ETSI TS 102 921 V1.1.1, "Machine-to-Machine communications (M2M); mIa, dIa and mId interfaces", 2012
- Dennis Fu, "CCF M2M Certification: Demystifying the testing for M2M devices", CDMA Certification Forum, 2012
- VerSign, "VeriSign Cable Modem Authentication Service", http://www.verisign.com/stellent/groups/public/documents/data_sheet/005349.pdf, 2005
- Z. Shelby, "Constrained Application Protocol (CoAP)draft-ietf-core-coap-18", IETF", 2013
- ETSI TS 102 689 v1.1.1, 'Machine-to-Machine communications(M2M); M2M service requirements', 2010
- C. Bormann, "CoRE Roadmap and ImplementationGuide", draft-bormann-core-roadmap-05", IETF, 2013
- Z. Shelby, "Constrained Application Protocol (CoAP)", draft-ietf-core-coap-18, IETF, 2013
Cited by
- A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments vol.16, pp.11, 2015, https://doi.org/10.5762/KAIS.2015.16.11.7541
- Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment vol.15, pp.5, 2015, https://doi.org/10.7236/JIIBC.2015.15.5.9