O'Reilly logo

Machine-to-machine (M2M) Communications by Mischa Dohler, Carles Anton-Haro

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12

Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks

A. Bartoli1 andrea.bartoli@entel.upc.edu; M. Dohler2,3; A. Kountouris4; D. Barthel4    1 Universitat Politecnica de Catalunya (UPC), Barcelona, Spain2 King's College London (KCL), London, UK3 Worldsensing, London, UK4 Orange, Paris, France

Abstract

Machine-to-machine (M2M) communications, as part of emerging 5th-generation (5G) communications networks, are growing in rollouts and importance due to their ability to deliver data in real time from the field. In these networks, thousands of devices are left unattended for years of operation without the possibility of human intervention. For that reason, the protection of data, infrastructure, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required