Security enhancement in tower monitoring system of oneM2M network

P. K. Dalela, Anurag Yadav, V. Tyagi
{"title":"Security enhancement in tower monitoring system of oneM2M network","authors":"P. K. Dalela, Anurag Yadav, V. Tyagi","doi":"10.1109/ANTS.2016.7947871","DOIUrl":null,"url":null,"abstract":"Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2016.7947871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.
oneM2M网络塔台监控系统的安全增强
机器对机器(M2M)通信是指设备之间相互连接,相互通信,并由不同的用户同时访问。由于许多设备是相互连接的,因此出现了有关数据访问和设备控制访问的安全性的问题。这种访问不能给未经授权的人,因此安全措施在M2M中很重要。远程信息处理发展中心(CDOT)开发了塔监测系统(TMS),用于监测电信塔的电力状态。由于CDOT开发的TMS设备根据其使用情况具有不同的类型和功能,因此我们需要针对不同的设备进行不同的安全实现。一些设备可能需要并支持一种安全方法,而另一些设备可能需要其他方法。在本文中,我们展示了如何在CDOT的TMS中实现oneM2M标准中规定的不同安全措施,oneM2M是M2M的标准体。除了oneM2M安全措施外,我们还根据TMS的要求实现了一些其他协议。这种方法是一种算法解决方案,可以更多地集成不同的安全措施,所以我们在这里实现新的安全协议,这些协议仍然不是任何M2M标准的一部分。因此,该算法解决方案不仅将帮助CDOT的TMS设备成为oneM2M架构的一部分,而且我们的集成算法方法将帮助基于oneM2M标准的设备在其网络中使用新的安全协议,这些协议仍未成为标准的一部分。本文提出了在CDOT TMS网络中实现oneM2M推荐传输层安全协议的集成算法。本文还提出了可以纳入oneM2M标准的新安全协议。因此,本文解决了以上两个问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信