Key establishment and management for secure cellular machine-to-machine communication

Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

M2M(Machine-to-Machine) communication is considered to be one of the major issues in future network. Especially, M2M will bring various benefits in wireless communications when it is interconnected with cellular network. Considering the characteristics of cellular M2M network, traditional security solutions are not practical to apply because the cellular M2M network is more vulnerable to various attacks. In this work, we consider security aspects for cellular M2M communication and propose a key management. Our proposal can provide reliability and efficiency for secure cellular M2M communication network.

Original languageEnglish
Title of host publicationProceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013
Pages579-584
Number of pages6
DOIs
StatePublished - 2013
Event7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013 - Taichung, Taiwan, Province of China
Duration: 3 Jul 20135 Jul 2013

Publication series

NameProceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013

Conference

Conference7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013
Country/TerritoryTaiwan, Province of China
CityTaichung
Period3/07/135/07/13

Keywords

  • cellular M2M communication
  • key management
  • M2M
  • security

Fingerprint

Dive into the research topics of 'Key establishment and management for secure cellular machine-to-machine communication'. Together they form a unique fingerprint.

Cite this