Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdrianto, Danielen_US
dc.contributor.authorLin, Fuchun Josephen_US
dc.date.accessioned2017-04-21T06:49:06Z-
dc.date.available2017-04-21T06:49:06Z-
dc.date.issued2015en_US
dc.identifier.isbn978-1-5090-0366-2en_US
dc.identifier.urihttp://hdl.handle.net/11536/135948-
dc.description.abstractETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are several protocols that we can choose. However, the standards do not describe in what condition a particular protocol will be the best among the others. In this paper we analyze which protocol is the most suitable for the use case where an IoT/M2M application generates a large amount of data in a short period of time. The criteria used include efficiency, cost, and effectiveness of the protocol. Our analysis is done based on the actual measurement of an ETSI standard-compliant prototype.en_US
dc.language.isoen_USen_US
dc.subjectMachine-to-Machine Communicationen_US
dc.subjectThe Internet of Thingsen_US
dc.subjectsecurity protocolsen_US
dc.titleAnalysis of Security Protocols and Corresponding Cipher Suites in ETSI M2M Standardsen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT)en_US
dc.citation.spage777en_US
dc.citation.epage782en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.department電機資訊國際碩士學位學程zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.contributor.departmentEECS International Graduate Program-Masteren_US
dc.identifier.wosnumberWOS:000380567200136en_US
dc.citation.woscount0en_US
Appears in Collections:Conferences Paper