{"title":"oneM2M网络塔台监控系统的安全增强","authors":"P. K. Dalela, Anurag Yadav, V. Tyagi","doi":"10.1109/ANTS.2016.7947871","DOIUrl":null,"url":null,"abstract":"Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security enhancement in tower monitoring system of oneM2M network\",\"authors\":\"P. K. Dalela, Anurag Yadav, V. Tyagi\",\"doi\":\"10.1109/ANTS.2016.7947871\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.\",\"PeriodicalId\":248902,\"journal\":{\"name\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS.2016.7947871\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2016.7947871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security enhancement in tower monitoring system of oneM2M network
Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.