Trusted Computing-Based Security Architecture For 4G Mobile Networks
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
IEEE Communications Magazine
Wireless and Mobile Networks Security
Wireless and Mobile Networks Security
Hi-index | 0.00 |
This paper introduces an efficient machine-to-machine M2M communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and security requirements. The security becomes more critical in Ad Hoc mode as new nodes attach to the cluster. A simplified protocol stack is considered here, while key components are introduced to provide secure communications between M2M and the network and also amongst M2M terminals.