Ad Hoc M2M communications and security based on 4G cellular system

In this paper, we introduce an M2M(machine-to-machine) communications model based on 4G cellular system which is capable to establish Ad Hoc networks wherever the terminals are close enough. The M2M terminal structure is proposed accordingly. In Ad Hoc mode, the security issue becomes more critical. We consider a simplified protocol stack while introducing key components to provide secure communication between M2M and the network and also among M2M terminals.

[1]  Yu Chen,et al.  Cellular Based Machine to Machine Communication with Un-Peer2Peer Protocol Stack , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[2]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[3]  Xiaohu Tang,et al.  Security scheme for 4G wireless systems , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[4]  Hannes Hartenstein,et al.  Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.

[5]  Hakima Chaouchi,et al.  Wireless and Mobile Network Security , 2009 .

[6]  Xiaohu Tang,et al.  Trusted Computing-Based Security Architecture For 4G Mobile Networks , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[7]  R. Ottoboni,et al.  An Improved M2M Platform for Multi-Sensors Agent Application , 2005, 2005 Sensors for Industry Conference.

[8]  Henning Wiemann,et al.  The LTE link-layer design , 2009, IEEE Communications Magazine.

[9]  Ian Curran,et al.  Overview of machine to machine and telematics , 2008 .