Institute of Electronics, Information and Communication Engineers, The (IEIC) - Security analysis based on Trusted Environment (TRE) of M2M/IoT

2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)

Author(s): Khamdamboy Urunov ; Jung-Il Namgung ; Soo-Hyun Park
Sponsor(s): KICS KNOM
Publisher: Institute of Electronics, Information and Communication Engineers, The (IEIC)
Publication Date: 1 August 2015
Conference Location: Busan, South Korea
Conference Date: 19 August 2015
Page(s): 554 - 557
ISBN (Electronic): 978-4-8855-2296-3
DOI: 10.1109/APNOMS.2015.7275390
Regular:

The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol... View More

Advertisement