Index

Note: Page numbers followed by f indicate figures and t indicate tables.

A

Access class barring (ACB) 110, 111f
Access stratum (AS) 
extended DRX cycle 274–275
power-saving state 275–278
Adaptive Modulation and Coding (AMC) mechanism 112
Ad hoc application level security model 231
Aggregated traffic models 138–139, 142–144
Alliance for Telecommunications Industry Solutions (ATIS) 18
Application security 244
Application-specific encryption 260
Automating building management 191–192

B

Bespoke body 105–106
BETaaS project 19
Billing and provisioning interfaces 253
Bootstrapping 237–242 See also Security bootstrap
Broadcast multicast/service center (BMSC) 259–260
Business implications, ...

Get Machine-to-machine (M2M) Communications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.