Research Article
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
549 downloads
@INPROCEEDINGS{10.1007/978-3-642-04434-2_19, author={Mike Meyerstein and Inhyok Cha and Yogendra Shah}, title={Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications}, proceedings={Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, proceedings_a={MOBISEC}, year={2012}, month={5}, keywords={Smart card UICC machine-to-machine communication embedded security trusted environment}, doi={10.1007/978-3-642-04434-2_19} }
- Mike Meyerstein
Inhyok Cha
Yogendra Shah
Year: 2012
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
MOBISEC
Springer
DOI: 10.1007/978-3-642-04434-2_19
Abstract
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Copyright © 2009–2024 ICST