Analysis of security protocols and corresponding cipher suites in ETSI M2M standards

Daniel Adrianto, Fuchun Lin

研究成果: Conference contribution同行評審

7 引文 斯高帕斯(Scopus)

摘要

ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are several protocols that we can choose. However, the standards do not describe in what condition a particular protocol will be the best among the others. In this paper we analyze which protocol is the most suitable for the use case where an IoT/M2M application generates a large amount of data in a short period of time. The criteria used include efficiency, cost, and effectiveness of the protocol. Our analysis is done based on the actual measurement of an ETSI standard-compliant prototype.

原文English
主出版物標題IEEE World Forum on Internet of Things, WF-IoT 2015 - Proceedings
發行者Institute of Electrical and Electronics Engineers Inc.
頁面777-782
頁數6
ISBN(電子)9781509003655
DOIs
出版狀態Published - 2015
事件2nd IEEE World Forum on Internet of Things, WF-IoT 2015 - Milan, 意大利
持續時間: 14 12月 201516 12月 2015

出版系列

名字IEEE World Forum on Internet of Things, WF-IoT 2015 - Proceedings

Conference

Conference2nd IEEE World Forum on Internet of Things, WF-IoT 2015
國家/地區意大利
城市Milan
期間14/12/1516/12/15

指紋

深入研究「Analysis of security protocols and corresponding cipher suites in ETSI M2M standards」主題。共同形成了獨特的指紋。

引用此