About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

Research Article

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

Download(Requires a free EAI acccount)
597 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-04434-2_19,
        author={Mike Meyerstein and Inhyok Cha and Yogendra Shah},
        title={Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={5},
        keywords={Smart card UICC machine-to-machine communication embedded security trusted environment},
        doi={10.1007/978-3-642-04434-2_19}
    }
    
  • Mike Meyerstein
    Inhyok Cha
    Yogendra Shah
    Year: 2012
    Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-04434-2_19
Mike Meyerstein1,*, Inhyok Cha1,*, Yogendra Shah1,*
  • 1: King of Prussia
*Contact email: meyersmv@btinternet.com, Inhyok.Cha@InterDigital.com, Yogendra.Shah@InterDigital.com

Abstract

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

Keywords
Smart card UICC machine-to-machine communication embedded security trusted environment
Published
2012-05-17
http://dx.doi.org/10.1007/978-3-642-04434-2_19
Copyright © 2009–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL