Essays about: "M2M security"

Showing result 1 - 5 of 7 essays containing the words M2M security.

  1. 1. Energy efficient topology formation for Bluetooth mesh networks using heterogeneous devices

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mohit Kumar Agnihotri; [2015]
    Keywords : ;

    Abstract : Internet of things (IoT) is the latest trend in our living spaces allowing machine to machine (M2M) communications at the extensive scale. To enable massive M2M communication and portable devices to run on limited power supplies for the extended duration of time, low-cost energy efficient wireless technologies are needed. READ MORE

  2. 2. Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach

    University essay from Linköpings universitet/Informationskodning; Linköpings universitet/Tekniska fakulteten

    Author : Anna Karlsson; [2015]
    Keywords : device fingerprinting; sensor identification; computer security; M2M; authentication;

    Abstract : The number of connected devices connected to the Internet is growing rapidly. When talking about devices it also covers the ones not having any contact with humans. This type of devices are the ones that are expected to increase the most. That is why the field of device fingerprinting is an area that requires further investigation. READ MORE

  3. 3. M2M and Mobile Communications : an Implementation in the Solar Energy Industry

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Antonio Gonzalez Robles; [2015]
    Keywords : M2M; CoAP; DTLS; Raspberry Pi; UDP; Wireless; Smart meter;

    Abstract : Machine-to-Machine (M2M) communications are used for several purposes, forinstance to transmit information derived from measurements collected frommonitoring instruments. M2M communications also allow intelligent devices toexchange real-time data without human intervention. READ MORE

  4. 4. Context-Aware Machine to Machine Communications in Cellular Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Javier Mendonca Costa; [2013]
    Keywords : Context-Awareness; Energy Efficiency.;

    Abstract : Cellular network based Machine-to-Machine (M2M) communications have been growing rapidly in recent years, being used in a wide range of services such as security, metering, health, remote control, tracking and so on. A critical issue that needs to be considered in M2M communications is the energy efficiency, typically the machines are powered by batteries of low capacity and it is important to optimize the way the power is consumed. READ MORE

  5. 5. A Proxy for Distributed Hash Table based Machine-to-Machine Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Daoyuan Li; [2011]
    Keywords : M2M; P2P; DHT; Proxy; Gateway; Zigbee; 6LoWPAN; CoAP; Cache;

    Abstract : Wireless sensor networks (WSNs) have been an increasingly interest for both researchers and entrepreneurs. As WSN technologies gradually matured and more and more use is reported, we find that most of current WSNs are still designed only for specific purposes. READ MORE