Password authentication with insecure communication
Communications of the ACM
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Performance Modeling And Analysis Of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling And Analysis Of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Fundamentals of WiMAX: Understanding Broadband Wireless Networking (Prentice Hall Communications Engineering and Emerging Technologies Series)
Exploring diversity: evaluating the cost of frequency diversity in communication and routing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Modeling Credit Reservation Procedure for UMTS Online Charging System
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Machine-to-Machine (M2M) communications are expected to include billions of smart devices in the next three to five years. However, existing communication standards are incapable of providing satisfactory performance for M2M traffic. In this paper, we outline some advances that will enable existing wireless personal area networks, in conjunction with existing cellular communication standards, to be adapted to the needs of M2M traffic.