Establishing security in machine-to-machine (M2M) communication devices and services
F. Ennesser; H. Ganem Gemalto, Meudon, France
This chapter introduces the challenges that need to be overcome in order to secure machine-to-machine and Internet of Things applications and explores corresponding solutions thoroughly, from the basic components, to the deployment chain, to field operation. The potential impact on the future business ecosystem of emerging trends involving multiple stakeholders from diverse fields, such as smart grids or smart cities, is also discussed.
Future security challenges in the Internet of Things (IoT) ...
Get Machine-to-machine (M2M) Communications now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.