본문 바로가기
  • Home

Authentication based on Cluster in Machine to Machine

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2010, 5(6), pp.103-109
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : December 31, 2010

Ryu Gab Sang 1 이근호 2

1동신대학교
2백석대학교

Candidate

ABSTRACT

As the developing of the information technology, more and more devices are with the capacity of communication and networking. The M2M(Machine to Machine) businesses which communicate with the Machines have been developing rapidly. The M2M communication is viewed as one of the next frontiers in wireless communications. In this paper, we propose a secure cluster based on a clustering scheme that provides an authentication scheme in M2M. We present detailed security threats against M2M cluster architecture. Our proposed procedure, called ACM(Authentication based on Clusters in M2M), designs an authentication procedure that relies on mutual trust between machines in clusters.

Citation status

* References for papers published after 2023 are currently being built.