{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:28:20Z","timestamp":1777894100283,"version":"3.51.4"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/comst.2016.2515516","type":"journal-article","created":{"date-parts":[[2016,1,6]],"date-time":"2016-01-06T19:10:14Z","timestamp":1452107414000},"page":"1241-1254","source":"Crossref","is-referenced-by-count":105,"title":["M2M Security: Challenges and Solutions"],"prefix":"10.1109","volume":"18","author":[{"given":"Amira","family":"Barki","sequence":"first","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]},{"given":"Said","family":"Gharout","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Traore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.102"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2013.6614820"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208702"},{"key":"ref31","article-title":"False data injection attacks in smart grid: Challenges and solutions","author":"yu","year":"2012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.191"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162375"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4919","article-title":"IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals","author":"kushalnagar","year":"2007"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741143"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946886"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2490428.2490438"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.165"},{"key":"ref64","first-page":"865","article-title":"A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves","volume":"62","author":"frey","year":"1994","journal-title":"Math Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2013.2244772"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref29","article-title":"GSMA embedded SIM specification-A single, common and global specification to accelerate growth in M2M","year":"2014","journal-title":"Remote M2M Provisionning"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_27"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.199"},{"key":"ref2","article-title":"The Internet of Things, how the next evolution of the Internet is changing everything","author":"evans","year":"2011"},{"key":"ref1","first-page":"23","article-title":"More than 50 billion connected devices","volume":"284","year":"2011"},{"key":"ref20","article-title":"From concept to delivery: The M2M market today","author":"kechiche","year":"2014","journal-title":"GSMA Intelligence"},{"key":"ref22","article-title":"Machine to machine communications (M2M), use cases of automotive applications in M2M capable networks","year":"2013"},{"key":"ref21","article-title":"eCall Data transfer; In-band modem solution; General description (Release 13)","year":"2015","journal-title":"3GPP TS 26 267 V13 0 0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160299"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.71"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.933478"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741147"},{"key":"ref50","first-page":"832","article-title":"LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks","author":"lai","year":"0","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883452"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6449413"},{"key":"ref58","first-page":"18","article-title":"An enhanced measurement transmission scheme for privacy protection in smart grid","author":"li","year":"0","journal-title":"Proc Int Conf Inf Netw (ICOIN)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.67"},{"key":"ref56","first-page":"335","article-title":"VPriv: Protecting privacy in location-based vehicular services","author":"popa","year":"0","journal-title":"Proc of the 18th Conf on USENIX Sec Symp"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2274288"},{"key":"ref52","first-page":"3429","article-title":"Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations","author":"nicanfar","year":"0","journal-title":"Proc IEEE InfoCom"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.111413.00196"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100713.00203"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/INFCOM.2005.1497918","article-title":"Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach","volume":"1","author":"zhang","year":"0","journal-title":"Proc 24th Annu Joint Conf IEEE Comput Commun Soc (INFOCOM)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2010.5478336"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","article-title":"M2M: From mobile to embedded Internet","volume":"49","author":"wu","year":"2011","journal-title":"IEEE Commun Mag"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.110113.00249"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6757898"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23041-7_21"},{"key":"ref17","article-title":"Machine-to-machine communications (M2M); Functional architecture","year":"2013"},{"key":"ref18","article-title":"Machine-to-machine communications (M2M); MIA, DIA and mid interfaces","year":"2014"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5193","article-title":"Protocol for carrying authentication for network access (PANA) framework","author":"jayaraman","year":"2008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225851"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.559"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref8","article-title":"SoK: Privacy technologies for smart grids&#x2014;A survey of options","author":"jawurek","year":"2012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2635"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.6406112"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref48","first-page":"1017","article-title":"A group-based authentication and key agreement for MTC in LTE networks","author":"cao","year":"0","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref47","first-page":"688","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1990","journal-title":"Advances in Cryptology"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2011.6167151"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2653"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486004"},{"key":"ref43","first-page":"2897","article-title":"A dynamic-encryption authentication scheme for M2M security in cyber-physical systems","author":"chen","year":"0","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7475979\/07373528.pdf?arnumber=7373528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:08:29Z","timestamp":1642003709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7373528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":68,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2515516","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}