Reference Hub3
Machine-to-Machine Communications and Security Solution in Cellular Systems

Machine-to-Machine Communications and Security Solution in Cellular Systems

Mahdy Saedy, Vahideh Mojtahed
Copyright: © 2011 |Volume: 3 |Issue: 2 |Pages: 10
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781613508046|DOI: 10.4018/jitn.2011040105
Cite Article Cite Article

MLA

Saedy, Mahdy, and Vahideh Mojtahed. "Machine-to-Machine Communications and Security Solution in Cellular Systems." IJITN vol.3, no.2 2011: pp.66-75. http://doi.org/10.4018/jitn.2011040105

APA

Saedy, M. & Mojtahed, V. (2011). Machine-to-Machine Communications and Security Solution in Cellular Systems. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 3(2), 66-75. http://doi.org/10.4018/jitn.2011040105

Chicago

Saedy, Mahdy, and Vahideh Mojtahed. "Machine-to-Machine Communications and Security Solution in Cellular Systems," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 3, no.2: 66-75. http://doi.org/10.4018/jitn.2011040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and security requirements. The security becomes more critical in Ad Hoc mode as new nodes attach to the cluster. A simplified protocol stack is considered here, while key components are introduced to provide secure communications between M2M and the network and also amongst M2M terminals.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.