Analysis of security protocols and corresponding cipher suites in ETSI M2M standards

Daniel Adrianto, Fuchun Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are several protocols that we can choose. However, the standards do not describe in what condition a particular protocol will be the best among the others. In this paper we analyze which protocol is the most suitable for the use case where an IoT/M2M application generates a large amount of data in a short period of time. The criteria used include efficiency, cost, and effectiveness of the protocol. Our analysis is done based on the actual measurement of an ETSI standard-compliant prototype.

Original languageEnglish
Title of host publicationIEEE World Forum on Internet of Things, WF-IoT 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages777-782
Number of pages6
ISBN (Electronic)9781509003655
DOIs
StatePublished - 1 Jan 2015
Event2nd IEEE World Forum on Internet of Things, WF-IoT 2015 - Milan, Italy
Duration: 14 Dec 201516 Dec 2015

Publication series

NameIEEE World Forum on Internet of Things, WF-IoT 2015 - Proceedings

Conference

Conference2nd IEEE World Forum on Internet of Things, WF-IoT 2015
CountryItaly
CityMilan
Period14/12/1516/12/15

Keywords

  • Machine-to-Machine Communication
  • The Internet of Things
  • security protocols

Fingerprint Dive into the research topics of 'Analysis of security protocols and corresponding cipher suites in ETSI M2M standards'. Together they form a unique fingerprint.

Cite this