DocumentCode :
3659253
Title :
Security analysis based on Trusted Environment (TRE) of M2M/IoT
Author :
Khamdamboy Urunov;Jung-Il Namgung;Soo-Hyun Park
Author_Institution :
Kookmin University, Ubiquitous System Lab., Financial Information Security, Seoul, Korea
fYear :
2015
Firstpage :
554
Lastpage :
557
Abstract :
The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol stacks, and communication mechanism. M2M/IoT is widely used in vary industrials energy, transport, industrial communication control, public/private services management, e-health, water, oil and other industries. In this security paper consists of such kind of scams and challenges, TRE mechanism, Pros and Cons of TRE possibility on Finance system.
Keywords :
"Security","Internet","Protocols","Mobile communication","Companies","Hardware"
Publisher :
ieee
Conference_Titel :
Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific
Type :
conf
DOI :
10.1109/APNOMS.2015.7275390
Filename :
7275390
Link To Document :
بازگشت