12

Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks

A. Bartoli1 andrea.bartoli@entel.upc.edu; M. Dohler2,3; A. Kountouris4; D. Barthel4    1 Universitat Politecnica de Catalunya (UPC), Barcelona, Spain2 King's College London (KCL), London, UK3 Worldsensing, London, UK4 Orange, Paris, France

Abstract

Machine-to-machine (M2M) communications, as part of emerging 5th-generation (5G) communications networks, are growing in rollouts and importance due to their ability to deliver data in real time from the field. In these networks, thousands of devices are left unattended for years of operation without the possibility of human intervention. For that reason, the protection of data, infrastructure, and ...

Get Machine-to-machine (M2M) Communications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.