Full metadata record
DC FieldValueLanguage
dc.contributor.authorHsu, Yu-Haoen_US
dc.contributor.authorLin, Fuchun Josephen_US
dc.date.accessioned2019-05-02T00:26:48Z-
dc.date.available2019-05-02T00:26:48Z-
dc.date.issued2017-01-01en_US
dc.identifier.isbn978-1-5090-2991-4en_US
dc.identifier.urihttp://hdl.handle.net/11536/151738-
dc.description.abstractThe IoT/M2M service providers need security mechanisms to avoid illegal usage of the service. Normally, this can be accomplished by using the certificate to authenticate the device before providing the service. In this paper, we consider the situation where a malicious user attempts to pay only for the service of a device but deploy the same certificate for many other devices to access the service illegally. To address this problem of duplicate certificates, we design two prevention mechanisms on top of the security framework defined in the oneM2M standard. Furthermore, we implement these two protection mechanisms on the OM2M platform and evaluate them in terms of their cost and performance in order to find the most suitable one for service providers.en_US
dc.language.isoen_USen_US
dc.subjectIoTen_US
dc.subjectM2Men_US
dc.subjectSecurityen_US
dc.subjectCertificateen_US
dc.subjectAuthenticationen_US
dc.subjectoneM2Men_US
dc.subjectOM2Men_US
dc.titlePreventing Misuse of Duplicate Certificates in IoT/M2M Systemsen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017)en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000463806000143en_US
dc.citation.woscount0en_US
Appears in Collections:Conferences Paper