As the developing of the information technology, more and more devices are with the capacity of communication and networking. The M2M(Machine to Machine) businesses which communicate with the Machines have been developing rapidly. The M2M communication is viewed as one of the next frontiers in wireless communications. In this paper, we propose a secure cluster based on a clustering scheme that provides an authentication scheme in M2M. We present detailed security threats against M2M cluster architecture. Our proposed procedure, called ACM(Authentication based on Clusters in M2M), designs an authentication procedure that relies on mutual trust between machines in clusters.
[journal]
Keun-Ho Lee
/ 2006
/ Authentication Protocol Using Threshold Certification in Hierarchical-Cluster-based Ad hoc Networks
/ Journal of Information Science and Engineering
23
: 539~567
[confproc]
Dong-Hoon Kim
/ 2009
/ Introduction of Case Study for M2M Intelligent machine Tools
/ Proceedings of 2009 IEEE International Symposium on Assembly and Manufacturing
: 17~20
[journal]
Inhyok Cha
/ 2009
/ Trust in M2M Communication
/ IEEE VEHICULAR TECHNOLOGY MAGAZINE
: 69~75
@article{ART001518172}, author={Ryu Gab Sang and 이근호}, title={Authentication based on Cluster in Machine to Machine}, journal={Journal of Knowledge Information Technology and Systems}, issn={1975-7700}, year={2010}, volume={5}, number={6}, pages={103-109}
TY - JOUR AU - Ryu Gab Sang AU - 이근호 TI - Authentication based on Cluster in Machine to Machine JO - Journal of Knowledge Information Technology and Systems PY - 2010 VL - 5 IS - 6 PB - Korea Knowledge Information Technology Society SP - 103 EP - 109 SN - 1975-7700 AB - As the developing of the information technology, more and more devices are with the capacity of communication and networking. The M2M(Machine to Machine) businesses which communicate with the Machines have been developing rapidly. The M2M communication is viewed as one of the next frontiers in wireless communications. In this paper, we propose a secure cluster based on a clustering scheme that provides an authentication scheme in M2M. We present detailed security threats against M2M cluster architecture. Our proposed procedure, called ACM(Authentication based on Clusters in M2M), designs an authentication procedure that relies on mutual trust between machines in clusters. KW - M2M(Machine to Machine);Authentication;Cluster;Information Security;Information Technology DO - UR - ER -
Ryu Gab Sang and 이근호. (2010). Authentication based on Cluster in Machine to Machine. Journal of Knowledge Information Technology and Systems, 5(6), 103-109.
Ryu Gab Sang and 이근호. 2010, "Authentication based on Cluster in Machine to Machine", Journal of Knowledge Information Technology and Systems, vol.5, no.6 pp.103-109.
Ryu Gab Sang, 이근호 "Authentication based on Cluster in Machine to Machine" Journal of Knowledge Information Technology and Systems 5.6 pp.103-109 (2010) : 103.
Ryu Gab Sang, 이근호. Authentication based on Cluster in Machine to Machine. 2010; 5(6), 103-109.
Ryu Gab Sang and 이근호. "Authentication based on Cluster in Machine to Machine" Journal of Knowledge Information Technology and Systems 5, no.6 (2010) : 103-109.
Ryu Gab Sang; 이근호. Authentication based on Cluster in Machine to Machine. Journal of Knowledge Information Technology and Systems, 5(6), 103-109.
Ryu Gab Sang; 이근호. Authentication based on Cluster in Machine to Machine. Journal of Knowledge Information Technology and Systems. 2010; 5(6) 103-109.
Ryu Gab Sang, 이근호. Authentication based on Cluster in Machine to Machine. 2010; 5(6), 103-109.
Ryu Gab Sang and 이근호. "Authentication based on Cluster in Machine to Machine" Journal of Knowledge Information Technology and Systems 5, no.6 (2010) : 103-109.