{"title":"机器对机器通信体系结构和安全标准化的考虑","authors":"E. N. Barnhart, Charles A. Bokath","doi":"10.1109/IMSAA.2011.6156367","DOIUrl":null,"url":null,"abstract":"This paper describes the challenges of Machine-to-Machine (M2M) communications architecture development and trends in the development of M2M architecture in the Telecommunications Industry Association and the European Telecommunications Standards Institute. Included is information regarding protocol stacks, high-level architecture and functional architecture. A discussion of the development of architectures for M2M security is provided, and use cases for direct and indirect connections between devices and applications M2M systems are presented.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Considerations for Machine-to-Machine communications architecture and security standardization\",\"authors\":\"E. N. Barnhart, Charles A. Bokath\",\"doi\":\"10.1109/IMSAA.2011.6156367\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes the challenges of Machine-to-Machine (M2M) communications architecture development and trends in the development of M2M architecture in the Telecommunications Industry Association and the European Telecommunications Standards Institute. Included is information regarding protocol stacks, high-level architecture and functional architecture. A discussion of the development of architectures for M2M security is provided, and use cases for direct and indirect connections between devices and applications M2M systems are presented.\",\"PeriodicalId\":445751,\"journal\":{\"name\":\"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMSAA.2011.6156367\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMSAA.2011.6156367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Considerations for Machine-to-Machine communications architecture and security standardization
This paper describes the challenges of Machine-to-Machine (M2M) communications architecture development and trends in the development of M2M architecture in the Telecommunications Industry Association and the European Telecommunications Standards Institute. Included is information regarding protocol stacks, high-level architecture and functional architecture. A discussion of the development of architectures for M2M security is provided, and use cases for direct and indirect connections between devices and applications M2M systems are presented.