{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:37:35Z","timestamp":1767137855658,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":77,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319108339","type":"print"},{"value":"9783319108346","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10834-6_14","type":"book-chapter","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T13:21:44Z","timestamp":1408972904000},"page":"255-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Communication and Security in Machine-to-Machine Systems"],"prefix":"10.1007","author":[{"given":"Iva","family":"Bojic","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Granjal","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Damjan","family":"Katusic","sequence":"additional","affiliation":[]},{"given":"Pavle","family":"Skocir","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Kusek","sequence":"additional","affiliation":[]},{"given":"Gordan","family":"Jezic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"key":"14_CR1","unstructured":"Galetic, V., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Basic principles of Machine-to-Machine communication and its impact on telecommunications industry. In: Proceedings of the 34th International Convention MIPRO, 2011, pp. 89\u201394 (2011)"},{"key":"14_CR2","unstructured":"SingTel M2M. http:\/\/info.singtel.com\/large-enterprise\/about-m2m. Accessed 30 Mar 2014"},{"key":"14_CR3","unstructured":"3GPP, TR 22.868 Study on Facilitating Machine-to-Machine Communication in 3GPP Systems (2008)"},{"key":"14_CR4","unstructured":"Watson, D.S., Piette, M.A., Sezgen, O., Motegi, N.: Machine-to-Machine (M2M) technology in demand responsive commercial buildings. In: Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings, 2004, pp. 1\u201314 (2004)"},{"key":"14_CR5","unstructured":"Emmerson, B.: M2M: the internet of 50 billion devices. Win-Win, pp. 19\u201322 (2010)"},{"key":"14_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119974031","volume-title":"M2M Communications: A Systems Approach","author":"D Boswarthick","year":"2012","unstructured":"Boswarthick, D., Hersent, O., Elloumi, O.: M2M Communications: A Systems Approach. Wiley-Blackwell, New York (2012)"},{"key":"14_CR7","unstructured":"ETSI, TR 102 897 Use Cases of M2M Applications for City Automation (2012)"},{"key":"14_CR8","unstructured":"ETSI, TR 102 857 Use Cases of M2M Applications for Connected Consumer (2013)"},{"key":"14_CR9","unstructured":"ETSI, TR 102 691 Smart Metering Use Cases (2010)"},{"key":"14_CR10","unstructured":"ETSI, TR 102 732 Use Cases of M2M Applications for eHealth (2013)"},{"key":"14_CR11","unstructured":"ETSI, TR 102 898 Use Cases of Automotive Applications in M2M Capable Networks (2013)"},{"key":"14_CR12","unstructured":"M2M World of Connected Services - Beecham. www.m2m.com\/docs\/DOC-1221. Accessed 30 Mar 2014"},{"issue":"15","key":"14_CR13","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzoria","year":"2010","unstructured":"Atzoria, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"issue":"7","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad-hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad-hoc Netw."},{"key":"14_CR15","unstructured":"Gantz, J.: The Embedded Internet: Methodology and Findings (2009)"},{"key":"14_CR16","unstructured":"Evans, D.: The Internet of Things: How the Next Evolution of the Internet Is Changing Everything (2011)"},{"key":"14_CR17","unstructured":"Hatton, M.: The Global M2M Market in 2013 (2013)"},{"issue":"6","key":"14_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2010.5675777","volume":"17","author":"M Zorzi","year":"2010","unstructured":"Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today\u2019s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view. IEEE Wirel. Commun. 17(6), 44\u201351 (2010)","journal-title":"IEEE Wirel. Commun."},{"key":"14_CR19","unstructured":"Katusic, D., Weber, M., Bojic, I., Jezic, G., Kusek, M.: Market, standardization, and regulation development in Machine-to-Machine communications. In: Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1\u20137 (2012)"},{"key":"14_CR20","unstructured":"ETSI M2M. www.etsi.org\/technologies-clusters\/technologies\/m2m. Accessed 30 Mar 2014"},{"key":"14_CR21","unstructured":"oneM2M. www.onem2m.org. Accessed 30 Mar 2014"},{"key":"14_CR22","unstructured":"Association of Radio Industries and Businesses. www.arib.or.jp\/english. Accessed 30 Mar 2014"},{"key":"14_CR23","unstructured":"Telecommunication Technology Committee. www.ttc.or.jp\/e. Accessed 30 Mar 2014"},{"key":"14_CR24","unstructured":"Alliance for Telecommunications Industry Solutions. www.atis.org. Accessed 30 Mar 2014"},{"key":"14_CR25","unstructured":"Telecommunications Industry Association. www.tiaonline.org. Accessed 30 Mar 2014"},{"key":"14_CR26","unstructured":"China Communications Standards Association. www.ccsa.org.cn\/english. Accessed 30 Mar 2014"},{"key":"14_CR27","unstructured":"Telecommunications Technology Association. www.tta.or.kr\/English. Accessed 30 Mar 2014"},{"key":"14_CR28","unstructured":"ETSI, TS 102 690 M2M Functional Architecture (2011)"},{"key":"14_CR29","unstructured":"Katusic, D., Skocir, P., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Universal identification scheme in Machine-to-Machine systems. In: Proceedings of the 12th International Conference on Telecommunications, 2013, pp. 71\u201378 (2013)"},{"key":"14_CR30","unstructured":"Jiang, D., ShiWei, C.: A study of information security for M2M of IOT. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 576\u2013579 (2010)"},{"issue":"4","key":"14_CR31","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","volume":"7","author":"D Djenouri","year":"2005","unstructured":"Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad-hoc networks and sensor networks. IEEE Commun. Surv. Tutorials 7(4), 2\u201328 (2005)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"14_CR32","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J-H Cho","year":"2011","unstructured":"Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"14_CR33","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"14_CR34","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MVT.2009.933478","volume":"4","author":"I Cha","year":"2009","unstructured":"Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Veh. Technol. Mag. 4(3), 69\u201375 (2009)","journal-title":"IEEE Veh. Technol. Mag."},{"key":"14_CR35","unstructured":"ETSI, TS 102 689 M2M Service Requirements (2010)"},{"key":"14_CR36","unstructured":"ETSI, TS 102 921 mIa, dIa and mId Interfaces (2012)"},{"key":"14_CR37","unstructured":"3rd Generation Partnership Project. www.3gpp.org. Accessed 30 Mar 2014"},{"key":"14_CR38","unstructured":"3rd Generation Partnership Project 2. www.3gpp2.org. Accessed 30 Mar 2014"},{"key":"14_CR39","unstructured":"Open Mobile Alliance. www.openmobilealliance.org. Accessed 30 Mar 2014"},{"key":"14_CR40","unstructured":"Broadband Forum. www.broadband-forum.org. Accessed 30 Mar 2014"},{"key":"14_CR41","unstructured":"Open Mobile Alliance, OMA Device Management Protocol (2008)"},{"key":"14_CR42","unstructured":"Broadband Forum, TR-069: CPE WAN Management Protocol (2011)"},{"key":"14_CR43","unstructured":"3GPP, TR 23.888 System Improvements for Machine-Type Communications (2012)"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Bojic, I., Jezic, G., Katusic, D., Desic, S., Kusek, M., Huljenic, D.: Communication in Machine-to-Machine environments. In: Proceedings of the 5th Balkan Conference in Informatics, 2012, pp. 283\u2013286 (2012)","DOI":"10.1145\/2371316.2371379"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (2004)","DOI":"10.17487\/rfc3748"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Haverinen, H., Salowey, J.: Extensible Authentication Protocol Method for Global System for Mobile Communications Subscriber Identity Modules (2006)","DOI":"10.17487\/rfc4186"},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (2006)","DOI":"10.17487\/rfc4187"},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Cakulev, V., Sundaram, G., Broustis, I.: IBAKE: Identity-Based Authenticated Key Exchange (2012)","DOI":"10.17487\/rfc6539"},{"key":"14_CR49","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security Protocol Version 1.2 (2008)","DOI":"10.17487\/rfc5246"},{"key":"14_CR50","doi-asserted-by":"crossref","unstructured":"Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (2013)","DOI":"10.17487\/rfc6960"},{"key":"14_CR51","unstructured":"IPv6 over Low power WPAN. https:\/\/datatracker.ietf.org\/wg\/6lowpan. Accessed 30 Mar 2014"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Pandey, S., Choi, M.-J., Kim, M.-S., Hong, J.: Towards management of Machine-to-Machine networks. In: Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011, pp. 1\u20137 (2011)","DOI":"10.1109\/APNOMS.2011.6077041"},{"key":"14_CR53","unstructured":"Actility Cocoon. http:\/\/cocoon.actility.com. Accessed 30 Mar 2014"},{"key":"14_CR54","unstructured":"The OpenMTC Vision. www.open-mtc.org\/index.html. Accessed 30 Mar 2014"},{"key":"14_CR55","unstructured":"Routing Over Low Power and Lossy Networks. http:\/\/datatracker.ietf.org\/wg\/roll\/charter. Accessed 30 Mar 2014"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks (2011)","DOI":"10.17487\/rfc6282"},{"key":"14_CR57","unstructured":"ZigBee IP Specification Overview. www.zigbee.org\/Specifications\/ZigBeeIP\/Overview.aspx. Accessed 30 Mar 2014"},{"key":"14_CR58","unstructured":"Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: Transmission of IPv6 Packets over Bluetooth Low Energy (2013)"},{"key":"14_CR59","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (2013)","DOI":"10.17487\/rfc7252"},{"key":"14_CR60","doi-asserted-by":"crossref","unstructured":"Kusek, M., Lovrek, I., Maracic, H.: Rich presence information in agent based Machine-to-Machine communication. In: Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, pp. 321\u2013329 (2013)","DOI":"10.1016\/j.procs.2013.09.109"},{"key":"14_CR61","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2010, pp. 1\u20136 (2010)","DOI":"10.1109\/WCNC.2010.5506580"},{"issue":"5","key":"14_CR62","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.adhoc.2010.08.020","volume":"9","author":"O Delgado-Mohatar","year":"2011","unstructured":"Delgado-Mohatar, O., F\u00faster-Sabater, A., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad-hoc Netw. 9(5), 727\u2013735 (2011)","journal-title":"Ad-hoc Netw."},{"key":"14_CR63","unstructured":"IEEE 802.1AR, Secure Device Identity. www.ieee802.org\/1\/pages\/802.1ar.html. Accessed 30 Mar 2014"},{"key":"14_CR64","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol (2008)","DOI":"10.17487\/rfc5201"},{"key":"14_CR65","doi-asserted-by":"crossref","unstructured":"Heer, T., Varjonen, S.: Host Identity Protocol Certificates (2011)","DOI":"10.17487\/rfc6253"},{"key":"14_CR66","unstructured":"Trusted Computing Group. www.trustedcomputinggroup.org. Accessed 30 Mar 2014"},{"issue":"5","key":"14_CR67","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzz. Knowl.-Based Syst."},{"issue":"4","key":"14_CR68","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2011.6094003","volume":"49","author":"R Lu","year":"2011","unstructured":"Lu, R., Li, X., Liang, X., Shen, X., Lin, X.: GRS: the green, reliability, and security of emerging Machine-to-Machine communications. IEEE Commun. Mag. 49(4), 28\u201335 (2011)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR69","volume-title":"SCADA: Supervisory Control and Data Acquisition","author":"SA Boyer","year":"2009","unstructured":"Boyer, S.A.: SCADA: Supervisory Control and Data Acquisition. International Society of Automation, Raleigh (2009)"},{"issue":"7","key":"14_CR70","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"key":"14_CR71","unstructured":"Internet Engineering Task Force. www.ietf.org. Accessed 30 Mar 2014"},{"key":"14_CR72","doi-asserted-by":"crossref","unstructured":"Granjal, J., Sa Silva, J., Monteiro, E., Sa Silva, R., Boavida, F.: Why is IPSec a viable option for wireless sensor networks. In: Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 802\u2013807 (2008)","DOI":"10.1109\/MAHSS.2008.4660130"},{"key":"14_CR73","unstructured":"Constrained RESTful Environments. https:\/\/datatracker.ietf.org\/wg\/core. Accessed 30 Mar 2014"},{"key":"14_CR74","doi-asserted-by":"crossref","unstructured":"Granjal, J., Monteiro, E., Sa Silva, J.: Network-layer security for the internet of things using TinyOS and BLIP. Int. J. Commun. Syst. 1\u201314 (2012)","DOI":"10.1002\/dac.2444"},{"key":"14_CR75","unstructured":"Granjal, J., Monteiro, E., Sa Silva, J.: End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In: Proceedings of the IFIP Networking Conference, 2013, pp. 1\u20139 (2013)"},{"key":"14_CR76","doi-asserted-by":"crossref","unstructured":"Granjal, J., Monteiro, E., Sa Silva, J.: On the feasibility of secure application-layer communications on the web of things. In: Proceedings of the IEEE 37th Conference on Local Computer Networks, 2012, pp. 228\u2013231 (2012)","DOI":"10.1109\/LCN.2012.6423615"},{"key":"14_CR77","unstructured":"Trust Chip Mobile Device Security. www.koolspan.com\/trustchip. Accessed 30 Mar 2014"}],"container-title":["Lecture Notes in Computer Science","Wireless Networking for Moving Objects"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10834-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T23:10:50Z","timestamp":1703200250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10834-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319108339","9783319108346"],"references-count":77,"aliases":["10.1007\/978-3-319-14116-9_14"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10834-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}