O'Reilly logo

Machine-to-machine (M2M) Communications by Mischa Dohler, Carles Anton-Haro

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

13

Establishing security in machine-to-machine (M2M) communication devices and services

F. Ennesser; H. Ganem    Gemalto, Meudon, France

Abstract

This chapter introduces the challenges that need to be overcome in order to secure machine-to-machine and Internet of Things applications and explores corresponding solutions thoroughly, from the basic components, to the deployment chain, to field operation. The potential impact on the future business ecosystem of emerging trends involving multiple stakeholders from diverse fields, such as smart grids or smart cities, is also discussed.

Keywords

Security

Trust

Credential

Provisioning

Bootstrapping

Privacy

Secure elements

13.1 Introduction

Future security challenges in the Internet of Things (IoT) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required